Journal
Journal of the American Medical Informatics Association : JAMIA
Alternate Journal
J Am Med Inform Assoc

As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.

Sax U, Kohane I, Mandl KD. Wireless technology infrastructures for authentication of patients: PKI that rings. Journal of the American Medical Informatics Association : JAMIA. 2005;12(3):263-8.
3
01/2005
1067-5027
15684133
263-8
12