Digital Credentials White Paper draft

advertisement

esMD Initiative Author of Record Sub Workgroup Report

DRAFT Digital Credential Management

Electronic Submission of

Medical Documentation

Author of Record Level 1

Sub Workgroup Report

Digital Credential Management

11/6/2012

10/10/12 1

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

Table of Contents

No table of figures entries found. ................................................................................................................. 3

0.5 Terms ...................................................................................................................................................... 4

1.0 Summary ................................................................................................................................................. 4

2.0 Statement of Problem ............................................................................................................................. 5

3.0 Requirements .......................................................................................................................................... 5

4.0 Assumptions ............................................................................................................................................ 6

5.0 Review of Standards ............................................................................................................................... 6

6.0 Evaluation of Alternative Solutions......................................................................................................... 7

7.0 Recommended Solution .......................................................................................................................... 8

7.1 Dependence on Identity Proofing ....................................................................................................... 8

7.2 CA Qualifications and List.................................................................................................................... 8

7.3 Credential Types, Forms and Contents ............................................................................................... 9

7.3.1 FBCA Certificates .......................................................................................................................... 9

7.3.2 Authentication Tokens ................................................................................................................. 9

7.4 Credential Maintenance Requirements ............................................................................................ 10

7.4.1 Key Pair and Certificate Usage ................................................................................................... 11

7.4.2 Certificate Renewal .................................................................................................................... 11

7.4.3 Certificate Re-Key ....................................................................................................................... 11

7.4.4 Modifications ............................................................................................................................. 12

7.45.5 Certificate Revocation and Suspension ................................................................................... 12

7.4.6 Key Escrow and Recovery .......................................................................................................... 13

7.5 “Trust Anchor” .................................................................................................................................. 14

7.6 Non-Repudiation Assurance ............................................................................................................. 14

8.0 Gaps ...................................................................................................................................................... 14

9.0 Risks, Issues and Obstacles ................................................................................................................... 14

Appendices .................................................................................................................................................. 15

Appendix A: Glossary ............................................................................................................................. 15

Appendix B: References .......................................................................................................................... 16

10/10/12 2

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

List of Figures:

List of Tables:

No table of figures entries found.

10/10/12 3

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

0.5 Terms

The following are definitions of specific terms used in this document. For a full list of definitions see

Appendix A: Glossary.

esMD – electronic submission of Medical Documentation

esMD Program – the program established by CMS for the electronic submission of Medical

Documentation

esMD Phase 1 – the first phase of the esMD program focused on the electronic submission of PDF(s) containing medical documentation in a C62 wrapper using the NwHIN Exchange – the primary source of the submission is through certified Health Information Handlers (HIHs) – esMD Phase 1 started pilot production submission of documents in September of 2011

esMD Phase 1 Transaction – the transaction specified in the Implementation Guide for Electronic

Submission of Medical Documentation Project (esMD) Version 2.9 (4/17/2012)

esMD Gateway – the CMS NwHIN Connect instance that receives esMD Phase I transactions for CMS

esMD Initiative – the current esMD Program effort in conjunction with the ONC S&I Framwork program focused on three specific use cases: 1) Provider registration, 2) secure transmission of the electronic

Medical Documentation Request, and 3) Author of Record, digital identities and digital signatures. With this initiative, the esMD Program is soliciting participation by commercial payers and including specific support for both CMS and commercial payers.

esMD Initiativie Transactions – the specific transactions defined by the esMD Initiative use cases and the subsequent implications guides

1.0 Summary

Summary of the workgroup effort and recommendation

On September 15, 2011, the esMD Program launched a pilot to accept electronic submissions from a group of Health Information Handlers (HIHs) and Medicare Review Contractors and commercial payers.

The current esMD initiative will enable Medicare Review Contractors to send electronic medical request letters, eliminating the need to send the paper letters via mail. The next release will also implement the replacement of wet signatures with Digital Signatures on the bundle of documents requested to send to

CMS or the appropriate commercial requestor.

Three separate work groups were assembled to address Identity Proofing, Digital Credentials, Signing, and Delegation of Rights issues associated with Digital signatures. The Digital Credential workgroup focused specifically on Digital Credential Management required to support Non-Repudiation Actions

(Signing and Delegation), Data Integrity, and Encryption.

10/10/12 4

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

The workgroup recommendations are constrained by two primary factors; (1) the solution must be implemented within the first two quarters of 2013, and (2) the systems that support esMD Initiative

(including esMD Phase 1) would have to abide standards established by the Federal Information Security

Management Act of 2002 (FISMA).

The workgroup identified a number of standards, but considering the FISMA requirements, special emphasis was placed on NIST SP 800-63-1 and X.509 Certificate Policy for the Federal Bridge

Certification Authority (FBCA) version 2.25 in determining the core requirements for their recommendations.

Section 6 of this document highlights a number of alternative solutions discussed during the evaluation including those belonging to Safe Biopharma’s FDA project, DEA’s e-Prescribe, and Direct.

The overall recommendation is that all entities, professional individuals (a natural person) or their agents and organizations, must use a digital certificate to sign esMD Initiative transactions and document bundles (as defined in the esMD Initiative Author of Record Level 1 Use Case). The certificate’s Certificate Authority (CA) must be cross certified with the FBCA at medium assurance.

Additionally, the provider should authenticate to the signing module or application with at least one additional authentication factor prior to the actual signing event. Adding the additional factor meets

NIST Level of Assurance (LOA) 3 and supports the non-repudiation assurances necessary for valid digital signatures. As technology options for both authentication and digital signing continue to evolve, the esMD Intiative should continue to monitor and update policies as appropriate to reflect improved technological capabilities.

2.0 Statement of Problem

Statement of problem

Define the required process for issuing and managing digital credentials for the electronic submission of

Medical Documentation to the Centers for Medicare and Medicaid Services (CMS) and commercial payers that adopt the esMD Initiative Implementation Guides.

3.0 Requirements

General Requirements for AoR L1 SWGs:

In general the solutions must: o be implementable for pilot in Q1/Q2 2013 o scale to all providers and payers o minimize the operational impact required to establish, maintain or use a digital identities o provide for non-repudiation without resorting to audit logs or validation of system configuration

Include standards identified in: o NIST SP 800-63-1 Level 3 and above (December 2011) o NIST SP 800-57 Part 1 (Revision 3 July 2012)

10/10/12 5

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case o NIST SP 800-89 o Federal Bridge Certification Authority Medium Level o X.509v3+ Digital Certificates

In-Scope o Digital credential life cycle o Relevant standards o Policy issues regarding Digital Credentials

Out-of-Scope (addressed by other esMD Intiative Author of Record Level 1 Sub-Workgroups) o Identity Proofing o Digital Signatures o Delegation of Rights

4.0 Assumptions

This section lists the assumptions used by the sub workgroup

Must comply with US government standards and regulations.

All certificates must be issued to individuals or entities, and include their unique identification

 number examples: Provider NPI, Health Plan HPID, Other Entity OEID, or EIN.

CMS does not plan issue credentials for digital signatures.

The I esMD Initiative Implementation Guides require digital signatures for provider registration the receipt of electronic Medical Documentation Requests (eMDR)

5.0 Review of Standards

This section enumerates the relevant standards and provides a short review of their relevance to the problem. Note inconsistencies between standards in this section

OMB M-04-04 defines four levels of assurance, Levels 1 to 4, in terms of the consequences of authentication errors and misuse of credentials. Level 1 is the lowest assurance level, and Level 4 is the highest. The OMB guidance defines the required level of authentication assurance in terms of the likely consequences of an authentication error. As the consequences of an authentication error become more serious, the required level of assurance increases. The OMB guidance provides agencies with the criteria for determining the level of e-authentication assurance required for specific applications and transactions, based on the risks and their likelihood of occurrence of each application or transaction.

NIST SP 800-63-1 supplements OMB M-04-04 and provides technical implementation guidance to the agencies. CMS performed a risk assessment on all their major assess and as general rule deemed that all of their external facing systems must, at a minimum meet, NIST Level 3 assurance level.

NIST Level 3 provides multi-factor remote network authentication, where at least two authentication factors are required. Level 3 authentication is based on proof of possession of the allowed types of tokens listed in section 7.2 of SP 800-63-1. Multi-factor Software Cryptographic Tokens are allowed as well as any “hard” cryptographic token methods of Level 4. Level 3 authentication requires cryptographic strength mechanisms that protect the primary authentication token against compromise by online guessing, replay, session hijacking, eavesdropping attacks, and impersonation attacks. “Manin-the-middle” attacks are strongly resisted when using FIPS 140-2 Level 2 or higher validated modules

10/10/12 6

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

Additional information about regarding validated FIPS 140-2 validated module can be found at : http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401val2012.htm

Authentication requires that the Claimant prove controls of the token. The Claimant unlocks the token with a password or biometric, or uses a secure multi-token authentication protocol to establish twofactor authentication.

Agencies are, in general, issuing certificates under the policies specified in the Federal PKI Common

Policy Framework [FBCA3] to satisfy FIPS 201 for PIV cards. Organizations outside the US Government have begun issuing credentials under a parallel set of policies and requirements known collectively as

PIV Interoperability specifications (PIV-I). Agencies that were early adopters of PKI technology, and organizations outside the Federal government, issue PKI certificates under organization specific policies instead of the Common Policy Framework. The primary mechanism for evaluating the assurance provided by public key certificates issued under organization specific policies is the policy mapping of the Federal Policy Authority to the Federal Bridge CA policies. These policies include the Rudimentary,

Basic, Medium, Medium-HW, and High assurance policies specified in [FBCA1] and the Citizen and

Commerce class policy specified in [FBCA2].

These policies incorporate all aspects of the credential lifecycle, and include security controls (e.g., multi-party control and system auditing for CSPs). However, the FPKI policies are based on work that largely predates the NIST SP 800-63 specification, and the security requirements are not always strictly aligned.

The table below summarizes how certificates issued under the Common Policy Framework correspond to the e-authentication assurance levels for those policies relevant to esMD Initiative.

FPKI LOA

Basic

Medium

Medium

Hardware

Common-HW

PIVI-HW

Assurance description

Basic level of risk and compromise.

Likelihood of malicious access not high

Moderate risk and compromise – includes monetary value or risk of fraud

High risk

800-63-1

Token and LOA

LOA3

LOA3

LOA4

800-63-1

ID Proofing

LOA3

LOA4

LOA4

6.0 Evaluation of Alternative Solutions

This section list alterative solutions that were considered and provide an evaluation of the merits of each.

DEA

The Drug Enforcement Administration (DEA) published an interim final rule in March of 2010 that proposed regulation for e-prescribing allowing doctors to electronically prescribe controlled substances.

10/10/12 7

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

Users of e-prescribing systems for controlled substances have to prove their identities with two of the following three factors:

 something you know (password);

 something you have (token) or

 something you are (biometric).

The interim final rule DEA is allows the use of a biometric as a substitute for a hard token or a password the IFR states.

** Expand on pilot by SureScript and Dr. First

Direct

The Direct Project develops specifications for a secure, scalable, standards-based way to establish universal health addressing and transport for participants (including providers, laboratories, hospitals, pharmacies and patients) using SMTP, S/MIME, and X.509 certificates to securely transport health information over the Internet.

** Expand on dual use key – non repudiation bit turned off. Cannot be used for signing but good candidate for 3 rd party providers to encrypt and send payload to esMD Gateway

7.0 Recommended Solution

This section describes the recommended solution and describes the details of the solutions in the following sub sections...

7.1 Dependence on Identity Proofing

This section describes dependence on Id Proofing

The issuance of digital credentials following this SWG’s recommendations require that the individual or entity has successfully completed identity proofing with a certified RA following, as a minimum, identity verification guidelines for FBCA Medium Assurance or NIST 800-63-1 LOA 4 as described in the recommendations from the Author of Record Identity Proofing SWG

7.2 CA Qualifications and List

This section describes CA qualifications and provides or cites a current list of qualified CAs

CAs submit Certification Practices Statements to the FPKI Management Authority for a compliance audit.

The FPKI Management Authority in turn submits the results for the audit to the FPKI Policy authority for approval. All CAs that have approved cross-certification for the following policies may be used for esMD

Initiative signing:

FBCA Medium, FBCA Medium CBP

FBCA Medium Hardware

FBCA Medium Hardware CBP

FBCA Medium Device

10/10/12 8

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

PIV-I Hardware

PIV-I Content Signing

A list of currently approved CAs may be located at: http://www.idmanagement.gov/pages.cfm/page/Federal-PKI-Management-Authority-entitiescrosscertified-with-the-FBCA

7.3 Credential Types, Forms and Contents

This section describes the types of credentials/tokens and their forms

7.3.1 FBCA Certificates

The below table lists the type of certificates that may be acceptable for esMD Initiative digital signatures. The FBCA indicates that group policies are not desired for non-repudiation efforts but its is possible that some CAs may have established additional policies that have been found appropriate for use by the Federal PKI Authority. CAs will need to be examined on a case by case basis.

Type

Individual

Contents

Identifies subscriber

May have organization affiliation

Role

Group

Where non-repudiation is desired

Identifies role not subscriber

Role may be issued to many subscribers but key pairs are unique

Cannot be shared

Sponsor must have individual certificate

Shared certificate among many

Were non-repudiation not desired

ISSO controls private key and tracks who had control at what time

7.3.2 Authentication Tokens

The following Authentication tokens are considered appropriate for second factor use in the esMD

Intitiative

Type Description

Memorized Secret Token Shared secret between user and credential provider

(Something you know)

Examples

PIN or Password

10/10/12 9

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

Pre Registered

Knowledge Tokens

Challenge/Response

Pre-registered responses or images

I forgot my password setup

Transaction information - “what was the amount of your last payment to your phone company

Set of shared secrets

(Something you know)

Out of Band Tokens

Single Factor One-Time

Password (OTP) Device

Physical token that can receive a secret for one time use

(Something you have)

Hardware device

(Something you have)

SMS message on a registered cell phone

RSA key fob token

Credit card password generator

Single Factor

Cryptographic Device

Multi-Factor

Cryptographic Token

Multi-Factor OTP

Multi-Factor

Cryptographic Device

Hardware device that performs crypto operation on input provided to the device

Requires a second factor

Generally a signed message

(Something you have)

Key is stored on a disk or soft media and requires activation

Does not require a second factor

Generally a signed message

(Something you have and something you know)

OTP hardware device that requires activation via PIN or biometric

(Something you have and something you know /or something you are)

Hardware device that contains protected key that requires activation through a second factor

Possession of device and control of key(Something you have and something you know or something you are)

PKI certificate

PKI certificate + PIN

Verizon or Symantec OTP offering

DAON IdX

PIV

PIV-I

ATM cards

7.4 Credential Maintenance Requirements

This section describes required or recommended credential maintenance

10/10/12 10

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

The certificate maintenance lifecycle is detailed in Chapter 4 of the FBCA. For convenience we have paraphrased and highlighted most of the options below. Please consult the FBCA and the FPKI

Management Authority for further guidance.

7.4.1 Key Pair and Certificate Usage

• Subscribers shall protect their private keys from access by other parties

• Restrictions in the intended scope of usage for a private key are specified through certificate extensions

7.4.2 Certificate Renewal

• Certificate renewal consists of issuing a new certificate with a new validity period and serial number while retaining all other information in the original certificate, including the public key.

• Frequent renewal of certificates may assist in reducing the size of CRLs.

• After certificate renewal, the old certificate may or may not be revoked, but must not be further re-keyed, renewed, or modified.

• A certificate may be renewed if the public key has not reached the end of its validity period, the associated private key has not been compromised, and the Subscriber name and attributes are unchanged.

• Certificates may also be renewed when a CA re-keys.

• Renewal shall only be accepted from certificate subjects, PKI sponsors, or RAs.

• CAs may perform renewal of its subscriber certificates without a corresponding request, such as when the CA re-keys.

7.4.3 Certificate Re-Key

• Re-keying a certificate consists of creating new certificates with a different public key (and serial number) while retaining the remaining contents of the old certificate that describe the subject.

• The new certificate may be assigned a different validity period, key identifiers, specify a different CRL distribution point, and/or be signed with a different key.

• Re-key of a certificate does not require a change to the subjectName and does not violate the requirement for name uniqueness.

• Subscribers shall identify themselves for the purpose of re-keying

• After certificate rekey, the old certificate may or may not be revoked, but must not be further re-keyed, renewed, or modified.

10/10/12 11

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

Re-key requests shall only be accepted from the subject of the certificate or PKI sponsors.

Additionally, CAs and RAs may initiate re-key of a subscriber’s certificates without a corresponding request.

7.4.4 Modifications

• Certificate modification consists of creating new certificates with subject information (e.g., a name or email address) that differs from the old certificate. For example, a CA may perform certificate modification for a Subscriber whose characteristics have changed (e.g., has just received a medical degree). The new certificate may have the same or different subject public key.

• After certificate modification, the old certificate may or may not be revoked, but must not be further re-keyed, renewed, or modified.

• The Principal CA may request certificate modification for currently cross-certified CAs.

• The validity period associated with the new certificate must not extend beyond the date of the old certificate MOA.

• Proof of all subject information changes must be provided to the RA or other designated agent and verified before the modified certificate is issued.

7.45.5 Certificate Revocation and Suspension

• Revocation requests must be authenticated. Requests to revoke a certificate may be authenticated using that certificate's associated private key, regardless of whether or not the private key has been compromised.

• All CAs shall publish CRLs.

• CAs that implement certificate revocation shall accept revocation requests from subscribers.

CAs that issue certificates in association with Affiliated Organizations shall accept revocation requests from the Affiliated Organization named in the certificate. Requests for certificate revocation from other parties may be supported by CAs.

• CAs that implement certificate revocation shall revoke certificates upon receipt of sufficient evidence of compromise or loss of the subscriber’s corresponding private key. A request to revoke a certificate shall identify the certificate to be revoked, explain the reason for revocation, and allow the request to be authenticated (e.g., digitally or manually signed).

• CAs will revoke certificates as quickly as practical upon receipt of a proper revocation request.

Revocation requests shall be processed before the next CRL is published, excepting those

10/10/12 12

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case requests validated within two hours of CRL issuance. Revocation requests validated within two hours of CRL issuance shall be processed before the following CRL is published.

• CRL issuance encompasses both CRL generation and publication.

• The interval between CRLs shall not exceed 24 hours.

• CRLs may be issued more frequently.

• For Principal CAs that are operated in an off-line manner, routine CRLs may be issued less frequently than specified above if the CA only issues: CA certificates, CSS certificates, and end user certificates solely for the administration of the principal CA.

• However, the interval between routine CRL issuance shall not exceed 31 days.

• CRLs shall be published within 4 hours of generation.

• CRL shall be published no later than the time specified in the nextUpdate field of the previously issued CRL for same scope.

• If on-line revocation/status checking is supported by an CA, the latency of certificate status information distributed on-line by CAs or their delegated status responders must meet or exceed the requirements for CRL issuance.

• A CA may also use other methods to publicize the certificates it has revoked. Any alternative method must meet the following requirements:

• The alternative method must be described in the CA’s approved CPS.

• The alternative method must provide authentication and integrity services commensurate with the assurance level of the certificate being verified.

• The alternative method must meet the issuance and latency requirements for CRLs

• In the event of a Principal CA private key compromise or loss, the cross- certificate shall be revoked and a CRL shall be published at the earliest feasible time by the FPKI Management

Authority.

• For CAs, when a CA certificate is revoked or subscriber certificate is revoked because of compromise, or suspected compromise of a private key, a CRL must be issued within 18 hours for medium and 6 hours for high.

7.4.6 Key Escrow and Recovery

• CA private keys are never escrowed.

10/10/12 13

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

• Subscriber key management keys may be escrowed to provide key recovery. CAs that support private key escrow for key management keys shall document their key recovery practices.

• Under no circumstances will a subscriber signature key be held in trust by a third party.

• CAs that support session key encapsulation and recovery shall identify the document describing the practices in the applicable CP.

7.5 “Trust Anchor”

This section describes how to evaluate and use the “trust anchor”

*** detail the process of trust anchors and the extended work necessary for full path validation for

reciever

7.6 Non-Repudiation Assurance

This sections describes the use of these credentials to ensure non-repudiation of signed transactions and events

Non-repudiation is assurance necessary for valid digital signatures, includingassurance of domain parameter validity, assurance of public key validity, assurance that the key pair owner actually possesses the private key, and assurance of the identity of the key pair owner.

*** place holder for greater detail – drives the second factor need

8.0 Gaps

This section describes any gaps that exist in recommended standards or policy

Not all providers are eligible for an NPI

9.0 Risks, Issues and Obstacles

The Risks, Issues and Obstacles section lists the concerns that might interfere with meeting the recommendations of the Sub Workgroup.

A.

B.

The burden to individual providers to obtain and manage certificates. Some reasons include that providers will need to learn how to obtain the certificates, undergo ID-proofing, implement enrollment policies, manage renewals, etc.

Provider Entities or Payer Entities that have Digital Certificates that are not issued by CAs cross-certified with the Federal Bridge that will need to obtain or have new Certificates issued to itself and its trading partners to be compliant with the identify proofing and

10/10/12 14

C.

D.

E.

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case certificate requirements

Compliance with Certificate Lifecycle (including revocation)

Issues inherent in the creation and use of X.509v3+ Digital Certificates

Limiting solution in a way that it does not allow for emerging technologies

Appendices

Appendix A: Glossary

A.

Authentication (NIST) - Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. [NS4009]

B.

Author (of Record) - The individual that creates a record.

C.

Certificate Authority (NIST) - An authority trusted by one or more users to issue and manage

X.509 Public Key Certificates and CARLs or CRLs.

D.

Credential -

E.

Data Integrity (NIST) - A property whereby data has not been altered in an unauthorized manner since it was created, transmitted or stored. Alteration includes the insertion, deletion and substitution of data.

F.

Decryption - The reverse process of encryption, i.e., to make the encrypted information readable again.

G.

Delegation of Rights - The ability to delegate rights or authority to another to act in a specific capacity on behalf of the grantor of the right. Digital Certificate (NIST) - A digital representation of information which at least (1) identifies the certification authority issuing it, (2) names or identifies its subscriber, (3) contains the subscriber's public key, (4) identifies its operational period, and (5) is digitally signed by the certification authority issuing it.

H.

Digital Id Management - A trusted authority is responsible for creating the key pair, distributing the private key, publishing the public key and revoking the keys as necessary. The “Passport

Office” of the Digital World. The keys and their associated information (e.g. Digital Certificate) are typically stored as software tokens, browser certificate stores, and hardware tokens (Smart

Cards, USB Tokens).

I.

Digital Signatures - “An artifact appended to a record as a result of a user’s intended action wherein that memorializes a signing event by a process that digitally signs a document or transaction using the private key component of his certificate.

(From NIST - The result of a transformation of a message by means of a cryptographic system using keys such that a Relying

Party can determine: (1) whether the transformation was created using the private key that corresponds to the public key in the signer’s digital certificate; and (2) whether the message has been altered since the transformation was made.) (From 800-63-1 an asymmetric key operation where the private key is used to digitally sign data and the public key is used to verify the signature. Digital signatures provide authenticity protection, integrity protection, and nonrepudiation.

J.

Encryption - In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

10/10/12 15

Use Case Development and Functional Requirements for Interoperability

DRAFT Digital Identities and Submission Level Signatures Use Case

K.

Id - A unique name of an individual person or legal. Since the legal names of persons and entities are not necessarily unique, the id of a person or must include sufficient additional information (for example an address and NPI number) to make the complete name unique.

L.

Id Proofing - The process by which the credential issuer validates sufficient information to uniquely identify a person or applying for the credential. It proves that the id exists, proves the applicant is entitled to that id, and address the potential for fraudulent issuance of credentials based on collusion.

M.

Non-repudiation (NIST) - A service that is used to provide assurance of the integrity and origin of data in such a way that the integrity and origin can be verified by a third party. This service prevents an from successfully denying involvement in a previous action.

N.

Public Key Infrastructure - A set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.

O.

Registration Authority (NIST) -An that is responsible for identification and authentication of certificate subjects, but that does not sign or issue certificates (i.e., a Registration Authority is delegated certain tasks on behalf of an authorized CA).

P.

X.509v3+ - Includes X.509 version 3 and all subsequent versions [RFC 5280 and its predecessors]

Appendix B: References

CMS Internet Only Manuals (IOM)

ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT

Recommendation for Obtaining Assurances for Digital Signature Applications

OMB 04-04

10/10/12 16

Download