DIRECT TRANSPORT FOR QH 10/18-19 F2F NOTES (SPN).

Slides:



Advertisements
Similar presentations
The Direct Project In A Box Vaibhav Bhandari (Engineer, Microsoft) Ali Emami (Engineer, Microsoft)
Advertisements

Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
NCOAUG Training Day Summer 2008 Presentation Approve and Send Your Purchase Order via Possible Configuration Options (11i) Presented by Al Kannan,
Enabling Secure Internet Access with ISA Server
Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Configuration Web Service Windows SMTP Service (Gateway) SMTP Event Sinks Security Agent Configuration Web/Console UI DNS Responder Real SMTP Server Inbound,
Overview and Demonstration of declarative workflows in SharePoint using Microsoft SharePoint Designer 2007 Kevin Hughes MCT, MCITP, MCSA, MCTS, MCP, Network+,
MEDITECH … Direct Messaging John Valutkevich Michael Henricksen
DMZ (De-Militarized Zone)
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Interoperability Kevin Schmidt Director, Clinical Network.
Direct Implementation Perspective 0 Mark Bamberg, Vice President Research & Development MEDfx.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
The Application Layer Chapter 7. Where are we now?
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Understanding and Leveraging MU2 Optional Transports Paul M. Tuten, PhD Senior Consultant, ONC Leader, Implementation Geographies Workgroup, Direct Project.
Deployment Models A. client (no S/MIME) »NHIN-Direct developed security agent »off-the-shelf S/MIME proxy B. client using Native S/MIME »Internet.
1 Enabling Secure Internet Access with ISA Server.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
1 What is Electronic Mail Exchanging information via computer networks Electronic mail addresses SMTP (Simple Mail Transfer Protocol) Client/Server based.
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Collaborative Direct-- Status Update December 6, 2013 Don Jorgenson Inpriva, Inc.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
NHIN-Direct SMTP/ Notes 6/8/2010. Why we chose Concepts match the charter exactly Implementations match the charter exactly* Well understood.
Module 6 Planning and Deploying Messaging Security.
Planning the Future of CDC Secure Public Health Transactions and Public Health Information Network Messaging System (PHINMS) Jennifer McGehee, Tim Morris,
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
Module 9: Fundamentals of Securing Network Communication.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
Module 4: Managing Recipients. Overview Introduction to Exchange Recipients Creating, Deleting, and Modifying Users and Contacts Managing Mailboxes Managing.
Module 5 Planning and Deploying Message Transport in Microsoft® Exchange Server 2010.
Module 7 Planning and Deploying Messaging Compliance.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
S imple O bject A ccess P rotocol Karthikeyan Chandrasekaran & Nandakumar Padmanabhan.
Draft Provider Directory Recommendations Begin Deliberations re Query for Patient Record NwHIN Power Team July 10, 2014.
Provider Directories Tasking, Review and Mod Spec Presentation NwHIN Power Team April 17, 2014.
Query Health Technical Working Group F2F meeting 10/17/2011 Agenda.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Query Health Abstract Model Diagrams. Query Network Community of participants that agree to interact with each other. There will be many networks; requestors.
 All lines are muted during presentation.  Lines are un-muted during Q&A ◦ If not asking question, please mute your line  *6 to mute your phone  *7.
Appendix B Advanced Topics in Exchange Server 2010.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
What is BizTalk ?
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Enabling Secure Internet Access with TMG
Get the Most Out of GoAnywhere: Agents
Module 8: Securing Network Traffic by Using IPSec and Certificates
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
IIS.
Simple Mail Transfer Protocol
Working at a Small-to-Medium Business or ISP – Chapter 7
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

DIRECT TRANSPORT FOR QH 10/18-19 F2F NOTES (SPN)

NwHIN Direct = for Healthcare Add “just enough” technology to to create a safe and usable environment Include providers and patients Provide an incremental path to evolve from…. – unstructured to structured data (attachments) – simple mail to integrated EHRs (inbox -> clinical task list) – manual to automated workflows And integrate seamlessly with the existing NwHIN/IHE constructs

MIME support for QH envelope Request – Body text: human-readable notes – Attachment: text/xml+queryhealth-query – Attachment: query payload Response – Body text: human-readable notes – Attachment: text/xml+queryhealth-response – Attachment: response data (text/csv?) Encrypted & Signed

Direct “Trust Circles” = “Query Networks” Need to be able to take advantage of “trust where we can find it” … individual, regional, organizational, someday national But demand convenience of a single address / infrastructure Solution = enable participation in multiple “trust circles” as demonstrated by possession of certificates from multiple CAs HITPC still working on global trust CCF Cleveland CCF Toronto CCF Abu Dhabi University Hospital CCF Trust Circle Ohio HIE Trust Circle

Query Lifecycle 1.Requestor optionally uses a query builder user interface to create a query and submits it to their dedicated orchestrator. 2.The orchestrator determines at what time and frequency the query should run (one time, monthly, etc.) and submits the query when appropriate to its requestor agent. 3.Requestor agent submits the query over the Internet to each participating organization’s responder agent and awaits responses. Responder agents may provide a number of services: additional authorization, manual review, etc. 4.The responder agent calculates site results using the appropriate data sources. 5.The responder agent returns site results to the appropriate requestor agent. 6.The requestor agent returns site results to the aggregator that combines site results into combined results 7.The aggregator makes interim and final results available to the requestor. Requestor Agent Responder Agent Responder Agent Query Builder UX Aggregator Source Data Authorized Requestor 1a 1b Responder “1”Responder “N” … Orchestrator 2 7 Note: All communication between Requestors and Responders are asynchronous.

Configuration Web Service Windows SMTP Service (Gateway) SMTP Event Sinks Security Agent SQL Configuration Web/Console UI DNS Responder “Real” SMTP Server Inbound, Outbound SMTP Msgs Clients MX, CERT Requests Human Admin Automated Admin XDD Gateway Inbound, Outbound XDD Msgs SMTP File DropPickup XDD Clients.NET R EFERENCE I MPLEMENTATION C OMPONENTS Query Health Agents and Computation engines

Direct-based QH Data Flow 1.Requestor uses a standard client or research software to send a Direct query to a known address, e.g., 2.Using standard COTS list software, the distributor forwards the request to nodes that have agreed to respond. Certificates enforce “query network” security. 3.Each response node replies with a Direct message containing query results 4.Requestor aggregates responses as needed, either automatically or manually Direct HISP COTS / open source mailing list software Client or other research software Direct HISP … EHR or other data source EHR or other data source Requestor Distributor Responder 1Responder N

Advantages of NwHIN/Direct for QH Transport Asynchronous by design (with built-in acknowledgement) Secure / Proofable Supportive of multiple “query networks” by config Native support for multiple “query types” Reference implementations already have extensibility hooks to call into computation engines Infrastructure used to support basic messaging scenarios is 100% reusable for Query Health. No capital investment required, no new firewall rules, no new technology for IT. Bonus: supports “plain old client” submission and receipt of QH queries if desired.