Ronald Bowron wrote: "If we could define the methodology for verifying
the identity of a CE as part of the TPA process, then the TPA may be
able to be automated....Would a notary model like Thawte
(www.thawte.com) is using for certificates be acceptable, or overly
complicated?"

Ronald:

Obviously we will have to consider authentication as part of the
Electronic Trading Partner Agreement process;  like I said earlier, the
last thing we would want to see is some hacker pretending to be Highmark
by commandeering Kepa's DNS node 54771.NAIC.HIPAA.NET, where every
provider relying on the DNS "directory" wanting to send claims to
Highmark could have them intercepted by the hacker - if a Public Key
Infrastructure (PKI) is not in place!

Only the "owner" of the DNS node should be able to authorize changing
the DNS node, and the Electronic TPA to which it points must be
authenticated with a digital signature so trading partners can rely on
the veracity of its contents.  Electronic Trading Partner Agreements can
be digitally "signed," and likewise, requests themselves to create or
modify the DNS pointer to an electronic TPA can be signed.

The ebXML initiative has looked at quite a few of the security aspects
of maintaining a reliable Registry and Repository (for containing CPPs -
the ebXML version of an Electronic Trading Partner Agreement).  See
https://www.oasis-open.org/committees/regrep/. Frankly, I think Kepa's
DNS "directory" scheme is considerably less bloated than ebXML's effort,
and can be implemented today within the HIPAA community. Having said
that, maybe it's still worthwhile to look at the ebXML RegRep to see if
there's something we can use or learn from.

Digital signatures require digital IDs or certificates which have
themselves been signed by a trusted third party - a "Certificate
Authority," or CA.  Ronald Bowron pointed us last Friday to an example
of such a CA, Verisign, who was collaborating with the AMA to certify
providers' digital certificates.  Presumably, the AMA is the expert in
identifying doctors, so this certificate authorization model makes sense
on the surface.

The Thawte notary model that Ronald asked about has the same weaknesses
that any certification service has which is based on in-person
presentation of credentials:  those credentials are easily
counterfeited.  For example, the Thawte notaries rely on in-person
presentation of a driver's license.  I guess it kind of gives you some
low-level assurance that an e-mail persona is possibly someone named on
the driver's license - and that may be good enough in most cases.  You
have to ascertain the level of risk you're willing to bear relying on
certificates backed by state-issued drivers licenses.

The Verisign EDI Digital certificates go a little further, in that
Verisign vets the submitted information, such as company name, against
Dun & Bradstreet reports and kind of makes sure the applicant really is
with the organization he purports to be with.  This service costs nearly
$1000. Is that good enough for a payer to rely on for validating the
identity of a provider submitting claims?  Maybe yes, when combined with
procedures where checks are mailed only to the address on file for
participating providers, or to the subscriber for out-of-network claims.

In any event, the methodology - however imperfect - already exists for
"verifying the identity of a CE as part of the TPA process."  Our
proposed system might be able to rely on CA-issued certificates which
contain the entity identifiers being authenticated; I think it is out of
scope for our group to worry about how those entities are authenticated
(by the CA) in the first place.

CA-issued certificates should be sufficient for automating the TPA
process.  The process for obtaining a certificate is not entirely
onerous on an entity, especially considering it only has to have *one*
digital certificate for trading with *all* potential partners - unlike
the horrible burden placed on it if separate paper TPAs have to be
negotiated with each and every individual trading partner.

For some useful background on Heathcare PKIs, please see stuff about the
AFEHCT/WEDi Healthcare Internet Security Interoperability Pilot at
http://www.afehct.org/security.asp, and PKI in Healthcare at
http://www.healthkey.org/library.htm.

William J. Kammerer
Novannet, LLC.
+1 (614) 487-0320


Reply via email to