Document 13245316

advertisement
Summary
 Introduction
 The protocols developed by ITU-T
 E-Health protocol
 Architecture of e-Health
 X.th1
 X.th2 to X.th6
 Common Alerting Protocol
 Conclusion
Introduction
E-Health is an area rich and complex, so safety
is an essential element in this type of
technology because of the sensitivity of the
data
transmitted.
Standard X.th offers this possibility of data
transport including safety.
The protocols developed by ITU-T
Two protocols for e-Health and protection:
 E-Health protocol X.th series (X.th1 to X.th6).
 Common Alerting Protocol X.1303.
E-Health protocol
The series of Recommendations contain:
o X.th1: generic recommendation.
o X.th2 to X.th6: specific recommendations.
Architecture of e-Health
Well endowed
clinic in an urban
area with expertise
Consultant /
Surgeon
Local medical team
(probably in a mobile
van) in another
country or rural area
Medical support
team
Video, surgical
manipulator
Surgical
equipments
Voice
Voice
Mobile /
satellite
X.th1
• The framework
• The protocol is open and extensible :
it contains several categories of exchange
o it provides security with encryption and
integrity of data.
o
Definition of objects
 Defines information object classes to defined objects
associated to:
•
•
•
•
•
Patients
Observers
Laboratories
Medical devices
Medical insurances
•
•
•
•
•
Medical staff
Pharmaceutical staff
Drug manufacturers
Medical software
Data records (dental, DNA)
Open protocol
Each data contains two elements:
• An ASN.1 object identifier
• The data itself
Definition of messages
Three types of messages:
• Setup message
• Send-and-ack
• Interactive
Setup message
• Type of communication
• Security mechanisms
• Usage of voice and video channels
Send-and-ack session
• The sender sends a message containing E-
Health data.
• The receiver replies with either:
•
•
an acknowledgment or
an error.
Interactive session
 It defines a dialog containing multiple
steps.
 This type of session has been designed
for remote interventions.
The security
It is based on CMS (Cryptographic
Message Syntax) which is provides:
• Integrity
• Encryption
CMS : normal and signed data
id-data (OID)
id-signedData (OID)
Data
Id-data (OID)
Data
signature
CMS : encrypted data and encrypted and
signed data
id-envelopedData (OID)
id-signedData (OID)
Encrypted symmetric key
Encrypted data
id-envelopedData (OID)
Encrypted symmetric key
Encrypted-data
signature
Encoding of messages
• BER: Basic Encoding Rules
• PER: Packed Encoding Rules for narrow
bandwidth
• XER: XML Encoding Rules
X.th2 to X.th6
• X.th2: physics
• X.th3: chemistry
• X.th4: biology
• X.th5: culturology
• X.th6 psychology
Elements defined in specific parts
Each part defines:
• Table of quantities, units and symbols.
• ASN.1 information objects for quantities,
units, and symbols.
• Messages to transport the data.
Common Alerting Protocol
 Initially developed by OASIS (Organization for the
Advancement of Structured Information Standards) in
April 2004 using XML (CAP 1.0).
 In 2007, this protocol has been completed with ASN.1
definitions and adopted as an ITU-T Recommendation
for CAP 1.1 (X.1303).
Common Alerting Protocol
 CAP is a protocol for alerting people for various events.
It is open and can be adapted by definition of profiles
for local needs.
 It is compatible with emerging technology of data
transmission.
 Compatible with encryption and signature.
 Support of images and audio data.
Main information of a CAP alert
A CAP message may contain four
categories for information:
• Identification parameters
• Information parameters
• Area parameters
• Resource parameters.
Identification and information parameters
 The identification parameters specify:
• identification of the message
• sender
• date time
• alert status (actual, exercise, test,etc)
• alert type (alert, acknowledgement, etc)
 The information parameters describe the event:
• category: fire, health, safety, etc.
• event: in human-readable text
• responseType: action needed (for example evacuate)
• urgency (expected, future, etc)
• severity (extreme, minor, moderate, etc)
• certainty (likely, possible, etc)
Area and resource parameters
 The area parameters specify the geographical
area
concerned by the alert which can be defined by:
• a polygon
• a circle
• an altitude
• A maximum altitude (ceiling).
 The information resources allow addition of more
information:
• files
• URI.
Message encoding
 The ASN.1 module contains in ITU-T X.1303 can be
used with any standard encoding rules.
 Two encoding rules are particularly used:
• XER (XML encoding rules): to be compatible with XML
applications.
• PER (Packed encoding rules): useful for networks using
narrow bandwidth.
Conclusion
The protocols developed in ITU-T are
appropriate for Radioactivity safety and
security situations:
• CAP can be used to alert population of
the situation and actions to be taken.
• E-Health allows remote tests and
diagnostics and also remote prescriptions.
Download