SlideShare a Scribd company logo
Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc   Session Title: Authenticated Document Workflow Welcome   to Transformation and Innovation 2007  The Business Transformation Conference Welcome
Agenda Authenticated Document Workflow Digital Certificates  How it Works? Benefits Advance Healthcare Directives (AHCD) Electronic AHCD What is MEDePass How it Works? Benefits Online Probation Investigation Reporting What is it? How It Works?
Public Key  - A Public Key is (1) the key of a signature key pair used to validate a digital  signature or (2) the key of an encryption key pair used to encrypt confidential information.  In both cases, this key is made publicly available. Private Key  - A Private Key is (1) the key of a signature key pair used to create a digital  signature or (2) the key of an encryption key pair used to decrypt confidential information.  In both cases, this key must be kept secret. Digital Certificate  - A Digital Certificate is a special message signed by a certificate  authority that contains the name of some user and their public key in such a way that  anyone can "verify" that the message was signed by no one other than the certification  authority and thereby develop trust in the user's public key. Digital Signature  - A Digital Signature is an electronic rather than a written signature that  can be used by someone to authenticate the identity of the sender of a message or of the  signer of a document.  Terminologies
Authenticated Document Workflow Adopting Digital Signatures to meet Legal & Workflow Requirements
Digital Certificates Digital certificates contain name, serial number, expiration  date and a copy of the certificate holder's public key (used for  encrypting messages and digital signatures), and the digital  signature of the certificate-issuing authority so that a recipient  can verify the authenticity of the certificate.
How it Works? (Attorney) (Judge)
How it Works Continued.. An individual wishing to send an encrypted message applies for a  digital certificate. The Certificate Authority (CA) issues a Certificate containing the applicant's public key and a variety of other identification  information. The CA makes its own public key readily available through  print publicity or perhaps on the Internet. The recipient of an encrypted  message uses the CA's public key to decode the digital certificate  attached to the message, verifies it as issued by the CA and then obtains  the sender's public key and identification information held within the  certificate. With this information, the recipient can send an encrypted  reply. The most widely used standard for digital certificates is  X.509 .
Benefits Original Message Original Message Public Key Private Key Encryption Decryption Encrypted Message It provides intuitive UI for end users (encryption, decryption, and digital signatures) In the event that information is intercepted, encryption ensures privacy that  prevents third parties from reading and or using the information to their own advantage.  It ensures that your transactions are not altered. It eliminates  paper and, as a consequence, reduces handling,  and storage costs. The digital certificates verify ones identity when trying to log on to computer systems. It prevents from unauthorized users.
Advanced Healthcare Directive, AHCD An Advance Health Care Directive is a legal document that provides directions for your health care if you are not able to speak for yourself or make decisions. The AHCD form is prepared well in advance to make sure that healthcare wishes of a person who is in a persistent vegetative state and is not able to make his or her healthcare decisions will be respected.
Electronic AHCD California Governor Schwarzenegger signed the Assembly Bill  2805 (AB 2805) that permits Advanced HealthCare Directives  to be digitally signed and notarized using the California digital  signature standards which were established in law in 1995.  CMA (California Medical Association) and Image-X  collaborated to create Electronic AHCD that can be digitally  signed both by patient and the notary and stored electronically  for easy authenticated access when needed by authenticated  authorities e.g. physician or patient and other related parties.
What is MEDePass As a trusted third party, MEDePass, Inc. authenticates the  identities of licensed healthcare professionals and their  staff. These identities are expressed electronically as  digital certificates (PKI) that you and your organization can  rely upon to conduct secure, confidential healthcare  business on the Internet.
How it Works? Patient installs the MEDePass client certificate Patient fills and submits the AHCD form Notary verifies and approves the AHCD form Physicians retrieve the AHCD
AHCD Homepage
Creating AHCD
Patient signing (before)
Patient signing (after)
Accessing AHCD
Acknowledgement of Notary Public
Benefits Electronically stores the Advanced Healthcare Directive (AHCD). Allows secure retrieval by physicians 24/7 in case of emergency. Can be filled online while maintaining privacy and confidentiality. Ensures that the will of the patient is being met.
Online Probation Investigation Reporting
What is it? Online Probation Investigation Reporting helps the Courts  to move from paper-based to electronic ways of working,  bringing environmental benefits and cost savings. Forms related to Probation Investigation Reporting can be  completed and submitted electronically using this website.  Later Courts can view, print, save these submitted forms.
How it Works? Probation Investigator fills  out the Probation Investigation  Reporting Form containing  information such as Filing date,  Case number, Location filing etc. County Clerk will review the  pending report and validate the  form that has been submitted  by the probation investigator. Judge and Attorney can  view the Investigation  reports submitted by the  probation investigator. Court clerk views the  Audit trial of Probation  Investigation reports.
Thank Y Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Contact Information: (805) 964-3535  [email_address] ou Thank  Y ou

More Related Content

PPT
Cupa pres a_2
PPTX
Digital signature certificate
PPTX
Securing eHealth, eGovernment and eBanking with Java - DWX '21
PDF
DS-Entrust-SSL-Document-Signing-APR16-WEB2
PDF
Guide for understanding digital signature
PPTX
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
PPTX
Digital signature & PKI Infrastructure
PPTX
Identity Proofing to provision accurately
Cupa pres a_2
Digital signature certificate
Securing eHealth, eGovernment and eBanking with Java - DWX '21
DS-Entrust-SSL-Document-Signing-APR16-WEB2
Guide for understanding digital signature
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Digital signature & PKI Infrastructure
Identity Proofing to provision accurately

What's hot (20)

PDF
Netiq css huntington_bank
PDF
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
PDF
Nursecoin technology platform overview
PPTX
Digital Signature
PDF
KYC Blockchain in Insurance Industry
PDF
Kantara - Consent & Information Sharing WG Update
PPTX
Digital signature and certificate authority
PPTX
Smart card kantara pids presentation grey
PDF
Proofing ex post facto from Cloud Identity Summit 2017
PDF
Whitepaper: Better Managing Patient Relationships and Information with eSigna...
PPTX
Digital signature
PDF
IRJET- Keep It – A System to Store Certificates and Develop a Profile
PPTX
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
PPTX
Digital signature certificate provider in delhi
PPT
IDoT: Challenges from the IDentities of Things Landscape
PDF
Can Blockchain Enable Identity Management?
PPTX
Electronic signature
PDF
DSC E-Sign File Attachment
PDF
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Netiq css huntington_bank
Multicard | Press Release | Multicard Implements Statewide Standard Credentia...
Nursecoin technology platform overview
Digital Signature
KYC Blockchain in Insurance Industry
Kantara - Consent & Information Sharing WG Update
Digital signature and certificate authority
Smart card kantara pids presentation grey
Proofing ex post facto from Cloud Identity Summit 2017
Whitepaper: Better Managing Patient Relationships and Information with eSigna...
Digital signature
IRJET- Keep It – A System to Store Certificates and Develop a Profile
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Digital signature certificate provider in delhi
IDoT: Challenges from the IDentities of Things Landscape
Can Blockchain Enable Identity Management?
Electronic signature
DSC E-Sign File Attachment
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Ad

Viewers also liked (19)

PPT
Making SOA a Reality for Federal Government Agencies
PPT
How a Business Process Vision May Boost Innovative Ideas
PPT
Applying Agile Development Strategies to BPM Initiatives
PPT
Why Enterprises Should Invest Money in EA Transformation Frameworks
PPT
Realizing Successful Transformation Within Politically Charged Environments
PPT
David Caruso Keynote Address
PPT
The Construction of Emergency Interoperable Communications Architecture
PPT
Properly Defining Enterprise-wide Entities: The Critical Step
PPT
BPM & Workflow in the New Enterprise Architecture
PPT
Transformation Case Study: Chester County Hospital
PPT
Governance and Business Participation: The Key Requirements for Effective SOA...
PPT
Jonathan Mack Keynote Address
PPT
Innovation in Healthcare: Transforming Paper to an eSubmissions SOA
PPT
Workflows, Identity 2.0 & Delegated Authorization using REST
PPT
Enabling The Service-Oriented Enterprise
PPT
Open Philosophies for Associative Autopoietic Digital Ecosystems
PPS
Understanding and Applying The Open Group Architecture Framework (TOGAF)
PPT
Measuring Process Maturity: The Business Process Maturity Model
PPS
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Making SOA a Reality for Federal Government Agencies
How a Business Process Vision May Boost Innovative Ideas
Applying Agile Development Strategies to BPM Initiatives
Why Enterprises Should Invest Money in EA Transformation Frameworks
Realizing Successful Transformation Within Politically Charged Environments
David Caruso Keynote Address
The Construction of Emergency Interoperable Communications Architecture
Properly Defining Enterprise-wide Entities: The Critical Step
BPM & Workflow in the New Enterprise Architecture
Transformation Case Study: Chester County Hospital
Governance and Business Participation: The Key Requirements for Effective SOA...
Jonathan Mack Keynote Address
Innovation in Healthcare: Transforming Paper to an eSubmissions SOA
Workflows, Identity 2.0 & Delegated Authorization using REST
Enabling The Service-Oriented Enterprise
Open Philosophies for Associative Autopoietic Digital Ecosystems
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Measuring Process Maturity: The Business Process Maturity Model
Understanding and Applying The Open Group Architecture Framework (TOGAF)
Ad

Similar to Authenticated Document/Data Exchange (20)

PDF
Difference between digital signature and digital certificate.pdf
PPT
What is Digital Signature, Digital Signature FAQ - eMudhra
PDF
Digital Attestation and E-Apostille Services – The Future of Document Authent...
PPTX
Think twice before you sign again!
PPTX
Digital Signatdsbuisduifhudosffdosfure.pptx
PPTX
Digital Signature in Indian Evidence act .pptx
PDF
The Ultimate Guide to Digital Signatures
PDF
The ultimate guide to digital signatures
PPTX
Understanding Digital Signature Certificates A Comprehensive Guide
PDF
Reasons for Business Owners to Choose DrySign - USA Summary Blog.pdf
PDF
An Introduction to Authentication for Applications
PPTX
Digital Signature.pptx
PDF
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...
DOCX
Ds over
PDF
Contribution of DSC in e-Governance .docx (1).pdf
PDF
The Importance of Electronic Identities in the Digital Era
PDF
Digital signatures whitepaper_thinkdox
DOCX
Proof of existence Market Research
PDF
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
PPTX
Digital signature
Difference between digital signature and digital certificate.pdf
What is Digital Signature, Digital Signature FAQ - eMudhra
Digital Attestation and E-Apostille Services – The Future of Document Authent...
Think twice before you sign again!
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signature in Indian Evidence act .pptx
The Ultimate Guide to Digital Signatures
The ultimate guide to digital signatures
Understanding Digital Signature Certificates A Comprehensive Guide
Reasons for Business Owners to Choose DrySign - USA Summary Blog.pdf
An Introduction to Authentication for Applications
Digital Signature.pptx
Embracing Digital Transformation Electronic Signatures for Audit Reports and ...
Ds over
Contribution of DSC in e-Governance .docx (1).pdf
The Importance of Electronic Identities in the Digital Era
Digital signatures whitepaper_thinkdox
Proof of existence Market Research
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signature

More from Nathaniel Palmer (20)

PDF
Is there a Role for Patterns in Enterprise Architecture?
PPT
The Future Of Bpm Six Trends Shaping Process Management
PDF
Is there a Role for Patterns in Enterprise Architecture?
PPT
Improving Enterprise Performance using a Business Process Improvement Discipline
PDF
Understanding Business Process Architecture to Enable Operational Efficiency
PPT
Applying Agile Development Strategies to BPM Initiatives
PPT
Workforce Management & BPM Integration
PPT
Delivering Process-Driven, Dynamic Applications
PPT
Realizing Successful Transformation Within Politically Charged Environments
PPT
Transitioning Enterprise Architectures to Service Oriented Architectures
PDF
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
PDF
What Every Enterprise Architect Needs to Know About BPM
PPT
Department of the Interior’s Methodology for Business Transformation (MBT)
PPT
The Construction of Emergency Interoperable Communications Architecture
PPT
Getting From Understanding to Execution: Making Implicit Processes Actionable...
PPT
Making SOA a Reality for Federal Government Agencies
PPT
Properly Defining Enterprise-wide Entities: The Critical Step
PPT
Wining the BPM Implementation War: How Lessons Learned in Iraq Can Help You ...
PPT
BPeX: A New Approach to BPMN Model Portability
PPT
Delivering BAM & BPM With Run-Time Integration
Is there a Role for Patterns in Enterprise Architecture?
The Future Of Bpm Six Trends Shaping Process Management
Is there a Role for Patterns in Enterprise Architecture?
Improving Enterprise Performance using a Business Process Improvement Discipline
Understanding Business Process Architecture to Enable Operational Efficiency
Applying Agile Development Strategies to BPM Initiatives
Workforce Management & BPM Integration
Delivering Process-Driven, Dynamic Applications
Realizing Successful Transformation Within Politically Charged Environments
Transitioning Enterprise Architectures to Service Oriented Architectures
What is Possible vs What is Useful: Finding the Right Balance in Process Mode...
What Every Enterprise Architect Needs to Know About BPM
Department of the Interior’s Methodology for Business Transformation (MBT)
The Construction of Emergency Interoperable Communications Architecture
Getting From Understanding to Execution: Making Implicit Processes Actionable...
Making SOA a Reality for Federal Government Agencies
Properly Defining Enterprise-wide Entities: The Critical Step
Wining the BPM Implementation War: How Lessons Learned in Iraq Can Help You ...
BPeX: A New Approach to BPMN Model Portability
Delivering BAM & BPM With Run-Time Integration

Recently uploaded (20)

PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PDF
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PDF
How to Get Funding for Your Trucking Business
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PPT
Chapter four Project-Preparation material
PDF
Laughter Yoga Basic Learning Workshop Manual
DOCX
Business Management - unit 1 and 2
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PPTX
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
Daniels 2024 Inclusive, Sustainable Development
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
SBI Securities Weekly Wrap 08-08-2025_250808_205045.pdf
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
How to Get Funding for Your Trucking Business
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
Nidhal Samdaie CV - International Business Consultant
Belch_12e_PPT_Ch18_Accessible_university.pptx
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
Chapter four Project-Preparation material
Laughter Yoga Basic Learning Workshop Manual
Business Management - unit 1 and 2
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
3. HISTORICAL PERSPECTIVE UNIIT 3^..pptx
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
ICG2025_ICG 6th steering committee 30-8-24.pptx

Authenticated Document/Data Exchange

  • 1. Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Session Title: Authenticated Document Workflow Welcome to Transformation and Innovation 2007 The Business Transformation Conference Welcome
  • 2. Agenda Authenticated Document Workflow Digital Certificates How it Works? Benefits Advance Healthcare Directives (AHCD) Electronic AHCD What is MEDePass How it Works? Benefits Online Probation Investigation Reporting What is it? How It Works?
  • 3. Public Key - A Public Key is (1) the key of a signature key pair used to validate a digital signature or (2) the key of an encryption key pair used to encrypt confidential information. In both cases, this key is made publicly available. Private Key - A Private Key is (1) the key of a signature key pair used to create a digital signature or (2) the key of an encryption key pair used to decrypt confidential information. In both cases, this key must be kept secret. Digital Certificate - A Digital Certificate is a special message signed by a certificate authority that contains the name of some user and their public key in such a way that anyone can "verify" that the message was signed by no one other than the certification authority and thereby develop trust in the user's public key. Digital Signature - A Digital Signature is an electronic rather than a written signature that can be used by someone to authenticate the identity of the sender of a message or of the signer of a document. Terminologies
  • 4. Authenticated Document Workflow Adopting Digital Signatures to meet Legal & Workflow Requirements
  • 5. Digital Certificates Digital certificates contain name, serial number, expiration date and a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify the authenticity of the certificate.
  • 6. How it Works? (Attorney) (Judge)
  • 7. How it Works Continued.. An individual wishing to send an encrypted message applies for a digital certificate. The Certificate Authority (CA) issues a Certificate containing the applicant's public key and a variety of other identification information. The CA makes its own public key readily available through print publicity or perhaps on the Internet. The recipient of an encrypted message uses the CA's public key to decode the digital certificate attached to the message, verifies it as issued by the CA and then obtains the sender's public key and identification information held within the certificate. With this information, the recipient can send an encrypted reply. The most widely used standard for digital certificates is X.509 .
  • 8. Benefits Original Message Original Message Public Key Private Key Encryption Decryption Encrypted Message It provides intuitive UI for end users (encryption, decryption, and digital signatures) In the event that information is intercepted, encryption ensures privacy that prevents third parties from reading and or using the information to their own advantage. It ensures that your transactions are not altered. It eliminates paper and, as a consequence, reduces handling, and storage costs. The digital certificates verify ones identity when trying to log on to computer systems. It prevents from unauthorized users.
  • 9. Advanced Healthcare Directive, AHCD An Advance Health Care Directive is a legal document that provides directions for your health care if you are not able to speak for yourself or make decisions. The AHCD form is prepared well in advance to make sure that healthcare wishes of a person who is in a persistent vegetative state and is not able to make his or her healthcare decisions will be respected.
  • 10. Electronic AHCD California Governor Schwarzenegger signed the Assembly Bill 2805 (AB 2805) that permits Advanced HealthCare Directives to be digitally signed and notarized using the California digital signature standards which were established in law in 1995. CMA (California Medical Association) and Image-X collaborated to create Electronic AHCD that can be digitally signed both by patient and the notary and stored electronically for easy authenticated access when needed by authenticated authorities e.g. physician or patient and other related parties.
  • 11. What is MEDePass As a trusted third party, MEDePass, Inc. authenticates the identities of licensed healthcare professionals and their staff. These identities are expressed electronically as digital certificates (PKI) that you and your organization can rely upon to conduct secure, confidential healthcare business on the Internet.
  • 12. How it Works? Patient installs the MEDePass client certificate Patient fills and submits the AHCD form Notary verifies and approves the AHCD form Physicians retrieve the AHCD
  • 19. Benefits Electronically stores the Advanced Healthcare Directive (AHCD). Allows secure retrieval by physicians 24/7 in case of emergency. Can be filled online while maintaining privacy and confidentiality. Ensures that the will of the patient is being met.
  • 21. What is it? Online Probation Investigation Reporting helps the Courts to move from paper-based to electronic ways of working, bringing environmental benefits and cost savings. Forms related to Probation Investigation Reporting can be completed and submitted electronically using this website. Later Courts can view, print, save these submitted forms.
  • 22. How it Works? Probation Investigator fills out the Probation Investigation Reporting Form containing information such as Filing date, Case number, Location filing etc. County Clerk will review the pending report and validate the form that has been submitted by the probation investigator. Judge and Attorney can view the Investigation reports submitted by the probation investigator. Court clerk views the Audit trial of Probation Investigation reports.
  • 23. Thank Y Dr. Mohammed Shaikh Chairman IMAGE-X Enterprises, Inc Contact Information: (805) 964-3535 [email_address] ou Thank Y ou