Wireless technology infrastructures for authentication of patients: PKI that rings.

Ulrich Sax, Isaac Kohane, Kenneth D Mandl
Author Information
  1. Ulrich Sax: Children's Hospital Informatics Program, 1 Autumn Street AU543, Boston, MA 02115, USA. usax@med.uni-goettingen.de

Abstract

As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

References

  1. BMJ. 2001 Feb 3;322(7281):283-7 [PMID: 11157533]
  2. Int J Med Inform. 2001 Jun;62(1):27-40 [PMID: 11340004]
  3. J Am Med Inform Assoc. 2002 Mar-Apr;9(2):171-80 [PMID: 11861632]
  4. Int J Med Inform. 2002 Apr;65(1):1-6 [PMID: 11904243]
  5. Behav Res Methods Instrum Comput. 2002 May;34(2):163-9 [PMID: 12109007]
  6. Proc AMIA Symp. 2002;:825-9 [PMID: 12463940]
  7. J Am Med Inform Assoc. 2005 Jan-Feb;12(1):47-54 [PMID: 15492031]
  8. BMC Med Inform Decis Mak. 2004 Jun 15;4:7 [PMID: 15196308]
  9. J Am Med Inform Assoc. 1994 Jul-Aug;1(4):316-9 [PMID: 7719815]
  10. Proc AMIA Symp. 1998;:356-60 [PMID: 9929241]
  11. J Am Med Inform Assoc. 2004 Nov-Dec;11(6):479-81 [PMID: 15298996]
  12. J Am Med Inform Assoc. 2004 Nov-Dec;11(6):448-57 [PMID: 15299002]
  13. Int J Comput Dent. 2002 Apr-Jul;5(2-3):125-32 [PMID: 12680044]

Grants

  1. N01-LM-3-3515/NLM NIH HHS

MeSH Term

Cell Phone
Computer Security
Confidentiality
Humans
Medical Informatics Applications
Medical Records Systems, Computerized

Word Cloud

Created with Highcharts 10.0.0authenticationhealthapplicationscaresecurityuseracceptancePHRsinformationtechnologypublicinterestconsumer-drivenelectronicrisesconcernsprivacyAchievingbalanceprovidingnecessarypromotingmajorobstaclelarge-scaledeploymentpersonalrecordsRobustreliableformsneededrecordwilloftencontainsensitiveprotectedincludingpatient'sannotationsSinceindustryperseunlikelysucceedsingle-handedlydevelopingdeployinglargescalenationalinfrastructuremakessenseleverageexistinghardwaresoftwarenetworksreportproposesnewmodelusersleveragingwirelessmobiledevicesCellphoneswidelydistributedhighofferadvancedprotocolsauthorsproposeharnessingstrongindividualscreatingregistrationauthorityserviceexamineproblemspromisesystemWirelessinfrastructurespatients:PKIrings

Similar Articles

Cited By (6)