190 likes | 402 Views
Electronic Submission of Medical Documentation (esMD) Sub-Workgroup. October 10, 2012. Agenda. esMD overall workflow Provider registration Secure transmission of electronic medical documentation requests Author of Record Level 1 – bundle signatures Verification
E N D
Electronic Submission of Medical Documentation (esMD)Sub-Workgroup October 10, 2012
Agenda • esMD overall workflow • Provider registration • Secure transmission of electronic medical documentation requests • Author of Record Level 1 – bundle signatures • Verification • Examples of Digital Signatures and Delegation of Rights • Identity Proofing • Digital Credential Life Cycle
esMD Initiative Overview Registration Authority Certificate Authority Provider Directories Gateway Provider Entity Payer Entity esMD UC 1: Provider Registration Contractors / Intermediaries Agent esMD UC 2: Secure eMDR Transmission Provider (Individual or Organization) Payer Payer Internal System esMD AoR Level 1 Digital Identities Bundle Signatures
esMD Workflow • Provider, payers and intermediaries obtain and maintain a non-repudiation digital identity • Provider registers for esMD (see UC1)* • Payer requests documentation (see UC2)* • Provider submits digitally signed document (bundle) to address request by payer • Payer validates the digital credentials, signature artifacts and, where appropriate, delegation of rights
Provider Registration • Provider is authenticated • Optional: • Provider delegates right to another entity to register for esMD • Registration Entity (Provider / Provider Agent / HIH) is authenticated • Registration Entity creates registration transaction and signs the payload using its signing certificate • Optional: • Transaction entity adds delegation of rights artifact(s) to establish unbroken chain to provider that is the subject of the registration • Registration Entity sends send transaction to payer • Payer validates identity of all sending parties, delegation of rights and integrity of registration transaction • Payer processes transaction • Payer creates response and signs payload using its signing certificate • Registration Entity receives payer registration response, validates sending party and integrity of payload • Registration Entity takes appropriate action based on response
Secure eMDR Transaction • Payer creates eMDR and signs the payload using its signing certificate • Optional: • Payer encrypts payload (PHI) with public key of intended recipient prior to signing • Payer creates transaction and send it to the address in the Provider Directory ESI (Receiving Entity) • Receiving Entity validates identity of payer, and integrity of eMDR payload • Optional • Receiving Entity uses private key to decrypt payload (PHI) • Question -- Is the payload encrypted using the public key of the Receiving Entity or the Provider? • Receiving Entity creates response and signs payload using its signing certificate • Payer receives response, validates sending party and integrity of payload • Payer takes appropriate action based on response
AoR -- Phased Scope of Work Level 1 – Current Focus • Focus is on signing a bundle of documents prior to transmission to satisfy an eMDR • Define requirements for esMD UC 1 and UC 2 Signature Artifacts • May assist with EHR Certification criteria in the future • Digital signature on aggregated documents (bundle) Level 2 - TBD Digital signature on an individual document • Focus is on signing an individual document prior to sending or at the point of creation by providers • Will inform EHR Certification criteria for signatures on patient documentation Level 3 - TBD • Digital signature to allow traceability of individual contributions to a document • Focus is on signing documents and individual contributions at the point of creation by providers • Will inform EHR Certification criteria for one or multiple signatures on patient documentation
AoR Level 1 -- Signature • Provider is authenticated • Optional: • Provider delegates right to another Signing Entity to sign responses to eMDR • Signing Entity is authenticated • Signing Entity creates document bundle and signs the payload using its signing certificate • Optional: • If the Signing Entity is not the provider then the Signing Entity adds delegation of rights artifact(s) to establish unbroken chain to provider that is the subject of the eMDR • If the Signing Entity is not the Responding Entity then the Signing Entity sends signed bundle and any delegation of rights artifacts to the Responding Entity (Do we need a delegation of rights from the Signing Entity to the Responding Entity if they are not the same – CMS does not appear to have a requirement other than an auditable trail) • Responding Entity (e.g. HIH) creates and sends the response to the eMDR to payer Payer validates identity of all sending parties, delegation of rights and integrity of document payload • Payer processes transaction • Payer creates response to transaction from (3) and signs payload using its signing certificate • Responding Entity receives payer eMDR submission response (5) validates sending party and integrity of payload • Responding Entity takes appropriate action based on response • Discussion regarding encryption of payload by the Signing Entity – create graphic of this process for review next week • Propose other wording for “response”
Validation (assuming X.509 signing certificate) • Recipient of transaction performs the following steps: • Validate the X.509 Digital Certificate(s) by verify the following: • Is it current : inspect both notBefore and notAfter dates • Can it be used for this purpose: intended use • Do we trust the certificate issuer : Chain to CA root certificate or Federal common policy CA • Do we trust the user: identity of holder • Has it been revoked: revocation list • Verify any assignment of rights • Compute hash of signed payload • Decrypt signed hash with public key • Verify that signed hash matches computed hash of signed payload • If necessary, decrypt payload using recipients private key
Public Digital Certificate &Signature Artifact Example 1. Dr. Smith attaches signature artifact to Request to Register to Receive eMDRs Private Key of Dr. Smith Registration Request Provider Name: Dr. Smith NPI: 987654 Service: Receive eMDRs checksum function Hash: 987654 signing algorithm Metadata Encrypted Hash: H8K9QTP Public Digital Certificate of Dr. Smith 2. Payer verifies the Request came from Dr. Smith and has not been tampered with Registration Request Provider Name: Dr. Smith NPI: 987654 Service: Receive eMDRs checksum function Hash: 987654 Verify Integrity signing algorithm Hash: 987654 Metadata Encrypted Hash: H8K9QTP Public Digital Certificate of Dr. Smith Public Key of Dr. Smith Verify Identity
Public Digital Certificate & Delegation of Rights Example (1/2) Private Key of Dr. Smith Assertion of Rights 1. Dr. Smith delegates the right to register his NPI to receive eMDRs to Medical Data, Inc. Dr. Bob Smith gives Medical Data, Inc. the right to register his NPI to receive eMDRs. Expiration Date: 1/1/2013 checksum function Hash: 123456 signing algorithm 2. Medical Data, Inc. includes their Signature Artifact, Dr. Smith’s Delegation of Rights Artifact, and both Public Digital Certificates in their Request to Register Dr. Smith to Receive eMDRs Metadata Encrypted Hash: U37G90P Registration Request Provider Name: Dr. Bob Smith NPI: 987654 Service: Receive eMDRs Metadata Encrypted Hash: H8K9QTP Public Digital Certificate of Medical Data, Inc. Delegation of Rights Artifact Public Digital Certificate of Dr. Smith
Public Digital Certificate & Delegation of Rights Example (2/2) 3. Payer verifies Medical Data, Inc. has the right to register Dr. Smith to receive eMDRs Registration Request Provider Name: Dr. Bob Smith NPI: 987654 Service: Receive eMDRs Metadata Encrypted Hash: H8K9QTP Public Digital Certificate of Medical Data, Inc. Delegation of Rights Artifact Public Digital Certificate of Dr. Smith Assertion of Rights Dr. Bob Smith gives Medical Data, Inc. the right to register his NPI to receive eMDRs. Expiration Date: 1/1/2013 checksum function Hash: 123456 Metadata Encrypted Hash: U37G90P Hash: 123456 signing algorithm Verify Right Public Key of Dr. Smith
Afternoon SWG Agenda • Workflow and options for • Identity Proofing • Credential Life Cycle Management • Authentication • Signing Process • Delegation of Rights
Identity Proofing – Individual Provider • Individual provider fills our application for Identity Proofing • Individual provider assembles required documents and picture IDs • Verification of identity process as part of: • CA/RA current level 4 defined process • Provider organization in-person verification process • Credentialing (e.g. for delivery of services in a hospital) • HR process • License process (State, DEA, other) • FDA process • Private Companies such as DAON • Public Notary (?) • Records documents and biometric (picture / fingerprint) • Validates documents to primary source and verifies and compares demographic information • Verification of NPI or other Payer Identification (e.g verify address associated with NPI or other Payer Identification) (Note: demographics / address must be maintained/updated prior to identity proofing as part of this process) • Issues confirmation to address of record • Issues Proof of Identity to CA
Identity Proofing – Organization Provider • Authorized representative fills our application for Identity Proofing • Authorized representative assembles required documents • Papers of incorporation • State license • Federal tax ID • Motion by board of directors for representative to act on organizations behalf • Authorized representative with prior identity proofing and digital credentials submits documents and personal ID as part of identity process: • State licensing • Payer review • Accreditation by recognized organization (e.g. The Joint Commissions) • Public Notary (?) • Records documents and biometric of representative (picture / fingerprint) • Validates document to primary source and verifies and compares demographic information • Verification of NPI or other Payer Identification • Issues verification to address of record • Issues Proof of Identity to CA
Digital Credential Life Cycle • Based on acceptable Identity Proofing, CA issues requested digital credentials to Individual or Organization • Purpose of digital credentials: • Signing • Encryption • Authorization • Direct • Other (e.g. ordering controlled substances) • Form factor • Software token (installed in server) • Hard token (ID card, USB token) • Reissue • Lost/compromised credentials • Renewal on expiration • Revocation Process • If identity is revoked then need to update accessible revocation list
Credential Process • Verify Identity Proofing • Issues appropriate credentials with some form of out-of-band notification • Install credentials in appropriate system (unless hard token) • Establish authorization process to access software token • Maintain security of token during its lifecycle • Renewal process on expiration
Authentication • Purpose of Authentication: • To access / use signing certificate to digitally sign documents, actions, transactions. • Methods: • Two factor to access the software token: • Password • One time key • Hard token • biometric. • Do you need to access software token once per session or with each use
Delegation of Rights • Methods for delegation: • Proxy certificates • Advantages • Understood form and use • Does not require additional delegation artifacts (self contained) • Holds information for active date, purpose, … • Disadvantages • No general support for trust chain from proxy certificates to antecedent proxy certificate or end-user certificate • Requires the delegation activity to be done with the specific proxy certificate • Revocation process – who and how is it handled • Delegation of Rights Artifacts (e.g SAML) • Advantages • Understood form and use • Requires use of artifact (eg. SAML to convey delegation) • Easy to use (sign with own certificate and provide assertion as proof of right • Uses certificate verification to ensure identity of grantor and grantee • Disadvantages • Revocation process – who and how is it handled • May not hold all required information without modification of standard