Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc   Session Title: Authenticated Document Workflow Welcome   to Transformation and Innovation 2007  The Business Transformation Conference Welcome
Agenda Authenticated Document Workflow Digital Certificates  How it Works? Benefits Advance Healthcare Directives (AHCD) Electronic AHCD What is MEDePass How it Works? Benefits Online Probation Investigation Reporting What is it? How It Works?
Public Key  - A Public Key is (1) the key of a signature key pair used to validate a digital  signature or (2) the key of an encryption key pair used to encrypt confidential information.  In both cases, this key is made publicly available. Private Key  - A Private Key is (1) the key of a signature key pair used to create a digital  signature or (2) the key of an encryption key pair used to decrypt confidential information.  In both cases, this key must be kept secret. Digital Certificate  - A Digital Certificate is a special message signed by a certificate  authority that contains the name of some user and their public key in such a way that  anyone can "verify" that the message was signed by no one other than the certification  authority and thereby develop trust in the user's public key. Digital Signature  - A Digital Signature is an electronic rather than a written signature that  can be used by someone to authenticate the identity of the sender of a message or of the  signer of a document.  Terminologies
Authenticated Document Workflow Adopting Digital Signatures to meet Legal & Workflow Requirements
Digital Certificates Digital certificates contain name, serial number, expiration  date and a copy of the certificate holder's public key (used for  encrypting messages and digital signatures), and the digital  signature of the certificate-issuing authority so that a recipient  can verify the authenticity of the certificate.
How it Works? (Attorney) (Judge)
How it Works Continued.. An individual wishing to send an encrypted message applies for a  digital certificate. The Certificate Authority (CA) issues a Certificate containing the applicant's public key and a variety of other identification  information. The CA makes its own public key readily available through  print publicity or perhaps on the Internet. The recipient of an encrypted  message uses the CA's public key to decode the digital certificate  attached to the message, verifies it as issued by the CA and then obtains  the sender's public key and identification information held within the  certificate. With this information, the recipient can send an encrypted  reply. The most widely used standard for digital certificates is  X.509 .
Benefits Original Message Original Message Public Key Private Key Encryption Decryption Encrypted Message It provides intuitive UI for end users (encryption, decryption, and digital signatures) In the event that information is intercepted, encryption ensures privacy that  prevents third parties from reading and or using the information to their own advantage.  It ensures that your transactions are not altered. It eliminates  paper and, as a consequence, reduces handling,  and storage costs. The digital certificates verify ones identity when trying to log on to computer systems. It prevents from unauthorized users.
Advanced Healthcare Directive, AHCD An Advance Health Care Directive is a legal document that provides directions for your health care if you are not able to speak for yourself or make decisions. The AHCD form is prepared well in advance to make sure that healthcare wishes of a person who is in a persistent vegetative state and is not able to make his or her healthcare decisions will be respected.
Electronic AHCD California Governor Schwarzenegger signed the Assembly Bill  2805 (AB 2805) that permits Advanced HealthCare Directives  to be digitally signed and notarized using the California digital  signature standards which were established in law in 1995.  CMA (California Medical Association) and Image-X  collaborated to create Electronic AHCD that can be digitally  signed both by patient and the notary and stored electronically  for easy authenticated access when needed by authenticated  authorities e.g. physician or patient and other related parties.
What is MEDePass As a trusted third party, MEDePass, Inc. authenticates the  identities of licensed healthcare professionals and their  staff. These identities are expressed electronically as  digital certificates (PKI) that you and your organization can  rely upon to conduct secure, confidential healthcare  business on the Internet.
How it Works? Patient installs the MEDePass client certificate Patient fills and submits the AHCD form Notary verifies and approves the AHCD form Physicians retrieve the AHCD
AHCD Homepage
Creating AHCD
Patient signing (before)
Patient signing (after)
Accessing AHCD
Acknowledgement of Notary Public
Benefits Electronically stores the Advanced Healthcare Directive (AHCD). Allows secure retrieval by physicians 24/7 in case of emergency. Can be filled online while maintaining privacy and confidentiality. Ensures that the will of the patient is being met.
Online Probation Investigation Reporting
What is it? Online Probation Investigation Reporting helps the Courts  to move from paper-based to electronic ways of working,  bringing environmental benefits and cost savings. Forms related to Probation Investigation Reporting can be  completed and submitted electronically using this website.  Later Courts can view, print, save these submitted forms.
How it Works? Probation Investigator fills  out the Probation Investigation  Reporting Form containing  information such as Filing date,  Case number, Location filing etc. County Clerk will review the  pending report and validate the  form that has been submitted  by the probation investigator. Judge and Attorney can  view the Investigation  reports submitted by the  probation investigator. Court clerk views the  Audit trial of Probation  Investigation reports.
Thank Y Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Contact Information: (805) 964-3535  [email_address] ou Thank  Y ou

More Related Content

PPT
Cupa pres a_2
PPTX
Digital signature certificate
PPTX
Securing eHealth, eGovernment and eBanking with Java - DWX '21
PDF
DS-Entrust-SSL-Document-Signing-APR16-WEB2
PDF
Guide for understanding digital signature
PPTX
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
PPTX
Digital signature & PKI Infrastructure
PPTX
Identity Proofing to provision accurately
Cupa pres a_2
Digital signature certificate
Securing eHealth, eGovernment and eBanking with Java - DWX '21
DS-Entrust-SSL-Document-Signing-APR16-WEB2
Guide for understanding digital signature
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Digital signature & PKI Infrastructure
Identity Proofing to provision accurately

What's hot (20)

PDF
Netiq css huntington_bank
PDF
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
PDF
Nursecoin technology platform overview
PPTX
Digital Signature
PDF
KYC Blockchain in Insurance Industry
PDF
Kantara - Consent & Information Sharing WG Update
PPTX
Digital signature and certificate authority
PPTX
Smart card kantara pids presentation grey
PDF
Proofing ex post facto from Cloud Identity Summit 2017
PDF
Whitepaper: Better Managing Patient Relationships and Information with eSigna...
PPTX
Digital signature
PDF
IRJET- Keep It – A System to Store Certificates and Develop a Profile
PPTX
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
PPTX
Digital signature certificate provider in delhi
PPT
IDoT: Challenges from the IDentities of Things Landscape
PDF
Can Blockchain Enable Identity Management?
PPTX
Electronic signature
PDF
DSC E-Sign File Attachment
PDF
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Netiq css huntington_bank
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
Nursecoin technology platform overview
Digital Signature
KYC Blockchain in Insurance Industry
Kantara - Consent & Information Sharing WG Update
Digital signature and certificate authority
Smart card kantara pids presentation grey
Proofing ex post facto from Cloud Identity Summit 2017
Whitepaper: Better Managing Patient Relationships and Information with eSigna...
Digital signature
IRJET- Keep It – A System to Store Certificates and Develop a Profile
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Digital signature certificate provider in delhi
IDoT: Challenges from the IDentities of Things Landscape
Can Blockchain Enable Identity Management?
Electronic signature
DSC E-Sign File Attachment
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Ad

Viewers also liked (19)

PPT
Making SOA a Reality for Federal Government Agencies
PPT
How a Business Process Vision May Boost Innovative Ideas
PPT
Applying Agile Development Strategies to BPM Initiatives
PPT
Why Enterprises Should Invest Money in EA Transformation Frameworks
PPT
Realizing Successful Transformation Within Politically Charged Environments
PPT
David Caruso Keynote Address
PPT
The Construction of Emergency Interoperable Communications Architecture
PPT
Properly Defining Enterprise-wide Entities: The Critical Step
PPT
BPM & Workflow in the New Enterprise Architecture
PPT
Transformation Case Study: Chester County Hospital
PPT
Governance and Business Participation: The Key Requirements for Effective SOA...
PPT
Jonathan Mack Keynote Address
PPT
Innovation in Healthcare: Transforming Paper to an eSubmissions SOA
PPT
Workflows, Identity 2.0 & Delegated Authorization using REST
PPT
Enabling The Service-Oriented Enterprise
PPT
Open Philosophies for Associative Autopoietic Digital Ecosystems
PPS
Understanding and Applying The Open Group Architecture Framework (TOGAF)
PPT
Measuring Process Maturity: The Business Process Maturity Model
PPS
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Making SOA a Reality for Federal Government Agencies
How a Business Process Vision May Boost Innovative Ideas
Applying Agile Development Strategies to BPM Initiatives
Why Enterprises Should Invest Money in EA Transformation Frameworks
Realizing Successful Transformation Within Politically Charged Environments
David Caruso Keynote Address
The Construction of Emergency Interoperable Communications Architecture
Properly Defining Enterprise-wide Entities: The Critical Step
BPM & Workflow in the New Enterprise Architecture
Transformation Case Study: Chester County Hospital
Governance and Business Participation: The Key Requirements for Effective SOA...
Jonathan Mack Keynote Address
Innovation in Healthcare: Transforming Paper to an eSubmissions SOA
Workflows, Identity 2.0 & Delegated Authorization using REST
Enabling The Service-Oriented Enterprise
Open Philosophies for Associative Autopoietic Digital Ecosystems
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Measuring Process Maturity: The Business Process Maturity Model
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Ad

Similar to Authenticated Document/Data Exchange (20)

PPT
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
PPT
Using digital certificates to secure sensitive communications at uw madison
PPT
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
PPT
Pki & personal digital certificates, the key to securing sensitive electronic...
PPTX
Enterprise Content Management and Digital Signiatures
PPT
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
PPT
Pki & personal digital certificates, securing sensitive electronic communicat...
PPT
Securing email and electronic documents with digital certificates, by nichola...
PPT
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
PDF
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
DOC
IT Act,2000
PPT
Healthcare Information Security Secure Sensitive Communications Within The ...
PPT
Healthcare information security secure sensitive communications within the ...
PDF
The Role of Digital Certificates in Contemporary Government Systems: the Case...
PPTX
Authentication(pswrd,token,certificate,biometric)
PPT
Pki the key to securing sensitive communications
PPT
Digital signature
PDF
Implementing The Affordable Care Act Essay
PDF
HIPAA HiTech Security Assessment
PPTX
Information Security (Digital Signatures)
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using digital certificates to secure sensitive communications at uw madison
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & personal digital certificates, the key to securing sensitive electronic...
Enterprise Content Management and Digital Signiatures
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & personal digital certificates, securing sensitive electronic communicat...
Securing email and electronic documents with digital certificates, by nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
IT Act,2000
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare information security secure sensitive communications within the ...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
Authentication(pswrd,token,certificate,biometric)
Pki the key to securing sensitive communications
Digital signature
Implementing The Affordable Care Act Essay
HIPAA HiTech Security Assessment
Information Security (Digital Signatures)

More from Nathaniel Palmer (20)

PDF
Is there a Role for Patterns in Enterprise Architecture?
PPT
The Future Of Bpm Six Trends Shaping Process Management
PDF
Is there a Role for Patterns in Enterprise Architecture?
PPT
Improving Enterprise Performance using a Business Process Improvement Discipline
PDF
Understanding Business Process Architecture to Enable Operational Efficiency
PPT
Applying Agile Development Strategies to BPM Initiatives
PPT
Workforce Management & BPM Integration
PPT
Delivering Process-Driven, Dynamic Applications
PPT
Realizing Successful Transformation Within Politically Charged Environments
PPT
Transitioning Enterprise Architectures to Service Oriented Architectures
PDF
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
PDF
What Every Enterprise Architect Needs to Know About BPM
PPT
Department of the Interior’s Methodology for Business Transformation (MBT)
PPT
The Construction of Emergency Interoperable Communications Architecture
PPT
Getting From Understanding to Execution: Making Implicit Processes Actionable...
PPT
Making SOA a Reality for Federal Government Agencies
PPT
Properly Defining Enterprise-wide Entities: The Critical Step
PPT
Wining the BPM Implementation War: How Lessons Learned in Iraq Can Help You ...
PPT
BPeX: A New Approach to BPMN Model Portability
PPT
Delivering BAM & BPM With Run-Time Integration
Is there a Role for Patterns in Enterprise Architecture?
The Future Of Bpm Six Trends Shaping Process Management
Is there a Role for Patterns in Enterprise Architecture?
Improving Enterprise Performance using a Business Process Improvement Discipline
Understanding Business Process Architecture to Enable Operational Efficiency
Applying Agile Development Strategies to BPM Initiatives
Workforce Management & BPM Integration
Delivering Process-Driven, Dynamic Applications
Realizing Successful Transformation Within Politically Charged Environments
Transitioning Enterprise Architectures to Service Oriented Architectures
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What Every Enterprise Architect Needs to Know About BPM
Department of the Interior’s Methodology for Business Transformation (MBT)
The Construction of Emergency Interoperable Communications Architecture
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Making SOA a Reality for Federal Government Agencies
Properly Defining Enterprise-wide Entities: The Critical Step
Wining the BPM Implementation War: How Lessons Learned in Iraq Can Help You ...
BPeX: A New Approach to BPMN Model Portability
Delivering BAM & BPM With Run-Time Integration

Recently uploaded (20)

PPTX
003 seven PARTS OF SPEECH english subject.pptx
PDF
BeMetals_Presentation_September_2025.pdf
PPTX
Hospitality & tourism management.pptxHospitality & tourism management.pptx
PDF
How to run a consulting project from scratch
PPTX
Business Research Methods- Secondary Data
PDF
The Relationship between Leadership Behaviourand Firm Performance in the Read...
PPTX
Warehouse. B pptx
PDF
109422672-Doc-8973-05-Security-Manual-Seventh-Edition.pdf
PDF
El futuro en e sector empresarial 2024 e
PDF
El futuro empresarial 2024 una vista gen
PDF
IFRS Green Book_Part B for professional pdf
PDF
Nante Industrial Plug Socket Connector Sustainability Insights
DOCX
Handbook of entrepreneurship- Chapter 10 - Feasibility analysis by Subin K Mohan
PPTX
Hospitality & tourism management.pptxHospitality & tourism management.pptx
PPTX
Accounting Management SystemBatch-4.pptx
PPTX
Enterprises are Classified into Two Categories
PPTX
Capital Investment in IS Infrastracture and Innovation (SDG9)
PPTX
OS ALL UNITS MATxtdtc5ctc5cycgctERIAL.pptx
PDF
The Influence of Historical Figures on Legal Communication (www.kiu.ac.ug)
PPTX
IndustrialAIGuerillaInnovatorsARCPodcastEp3.pptx
003 seven PARTS OF SPEECH english subject.pptx
BeMetals_Presentation_September_2025.pdf
Hospitality & tourism management.pptxHospitality & tourism management.pptx
How to run a consulting project from scratch
Business Research Methods- Secondary Data
The Relationship between Leadership Behaviourand Firm Performance in the Read...
Warehouse. B pptx
109422672-Doc-8973-05-Security-Manual-Seventh-Edition.pdf
El futuro en e sector empresarial 2024 e
El futuro empresarial 2024 una vista gen
IFRS Green Book_Part B for professional pdf
Nante Industrial Plug Socket Connector Sustainability Insights
Handbook of entrepreneurship- Chapter 10 - Feasibility analysis by Subin K Mohan
Hospitality & tourism management.pptxHospitality & tourism management.pptx
Accounting Management SystemBatch-4.pptx
Enterprises are Classified into Two Categories
Capital Investment in IS Infrastracture and Innovation (SDG9)
OS ALL UNITS MATxtdtc5ctc5cycgctERIAL.pptx
The Influence of Historical Figures on Legal Communication (www.kiu.ac.ug)
IndustrialAIGuerillaInnovatorsARCPodcastEp3.pptx

Authenticated Document/Data Exchange

  • 1. Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Session Title: Authenticated Document Workflow Welcome to Transformation and Innovation 2007 The Business Transformation Conference Welcome
  • 2. Agenda Authenticated Document Workflow Digital Certificates How it Works? Benefits Advance Healthcare Directives (AHCD) Electronic AHCD What is MEDePass How it Works? Benefits Online Probation Investigation Reporting What is it? How It Works?
  • 3. Public Key - A Public Key is (1) the key of a signature key pair used to validate a digital signature or (2) the key of an encryption key pair used to encrypt confidential information. In both cases, this key is made publicly available. Private Key - A Private Key is (1) the key of a signature key pair used to create a digital signature or (2) the key of an encryption key pair used to decrypt confidential information. In both cases, this key must be kept secret. Digital Certificate - A Digital Certificate is a special message signed by a certificate authority that contains the name of some user and their public key in such a way that anyone can "verify" that the message was signed by no one other than the certification authority and thereby develop trust in the user's public key. Digital Signature - A Digital Signature is an electronic rather than a written signature that can be used by someone to authenticate the identity of the sender of a message or of the signer of a document. Terminologies
  • 4. Authenticated Document Workflow Adopting Digital Signatures to meet Legal & Workflow Requirements
  • 5. Digital Certificates Digital certificates contain name, serial number, expiration date and a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify the authenticity of the certificate.
  • 6. How it Works? (Attorney) (Judge)
  • 7. How it Works Continued.. An individual wishing to send an encrypted message applies for a digital certificate. The Certificate Authority (CA) issues a Certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X.509 .
  • 8. Benefits Original Message Original Message Public Key Private Key Encryption Decryption Encrypted Message It provides intuitive UI for end users (encryption, decryption, and digital signatures) In the event that information is intercepted, encryption ensures privacy that prevents third parties from reading and or using the information to their own advantage. It ensures that your transactions are not altered. It eliminates paper and, as a consequence, reduces handling, and storage costs. The digital certificates verify ones identity when trying to log on to computer systems. It prevents from unauthorized users.
  • 9. Advanced Healthcare Directive, AHCD An Advance Health Care Directive is a legal document that provides directions for your health care if you are not able to speak for yourself or make decisions. The AHCD form is prepared well in advance to make sure that healthcare wishes of a person who is in a persistent vegetative state and is not able to make his or her healthcare decisions will be respected.
  • 10. Electronic AHCD California Governor Schwarzenegger signed the Assembly Bill 2805 (AB 2805) that permits Advanced HealthCare Directives to be digitally signed and notarized using the California digital signature standards which were established in law in 1995. CMA (California Medical Association) and Image-X collaborated to create Electronic AHCD that can be digitally signed both by patient and the notary and stored electronically for easy authenticated access when needed by authenticated authorities e.g. physician or patient and other related parties.
  • 11. What is MEDePass As a trusted third party, MEDePass, Inc. authenticates the identities of licensed healthcare professionals and their staff. These identities are expressed electronically as digital certificates (PKI) that you and your organization can rely upon to conduct secure, confidential healthcare business on the Internet.
  • 12. How it Works? Patient installs the MEDePass client certificate Patient fills and submits the AHCD form Notary verifies and approves the AHCD form Physicians retrieve the AHCD
  • 19. Benefits Electronically stores the Advanced Healthcare Directive (AHCD). Allows secure retrieval by physicians 24/7 in case of emergency. Can be filled online while maintaining privacy and confidentiality. Ensures that the will of the patient is being met.
  • 21. What is it? Online Probation Investigation Reporting helps the Courts to move from paper-based to electronic ways of working, bringing environmental benefits and cost savings. Forms related to Probation Investigation Reporting can be completed and submitted electronically using this website. Later Courts can view, print, save these submitted forms.
  • 22. How it Works? Probation Investigator fills out the Probation Investigation Reporting Form containing information such as Filing date, Case number, Location filing etc. County Clerk will review the pending report and validate the form that has been submitted by the probation investigator. Judge and Attorney can view the Investigation reports submitted by the probation investigator. Court clerk views the Audit trial of Probation Investigation reports.
  • 23. Thank Y Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Contact Information: (805) 964-3535 [email_address] ou Thank Y ou