Display Settings:

Format

Send to:

Choose Destination
See comment in PubMed Commons below
J Am Med Inform Assoc. 2005 May-Jun;12(3):263-8. Epub 2005 Jan 31.

Wireless technology infrastructures for authentication of patients: PKI that rings.

Author information

  • 1Children's Hospital Informatics Program, 1 Autumn Street AU543, Boston, MA 02115, USA. usax@med.uni-goettingen.de

Abstract

As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

PMID:
15684133
[PubMed - indexed for MEDLINE]
PMCID:
PMC1090456
Free PMC Article
PubMed Commons home

PubMed Commons

0 comments
How to join PubMed Commons

    Supplemental Content

    Full text links

    Icon for PubMed Central
    Loading ...
    Write to the Help Desk