🩹Technical Explanation
Last updated
Last updated
Participants Definitions and Permissions
With a plethora of different actors, identity management and access to data is key to HealthLink’s solution. A dynamic system has been developed that identifies actors and gives them the appropriate scope over a health record, contingent on the patient’s permission. Below are some examples of read/write permission:
Table: Read / Write Permission
Encryption Cryptography
To ensure privacy, health records are encrypted using symmetric key cryptography. The record will be encrypted and stored in a data store within the appropriate regulatory jurisdiction. The symmetric key will be encrypted with the public key of a 2048-bit RSA key pair. Each time an entity is given permission to access the patient’s record:
The record is decrypted with the owner’s private key
The symmetric key is encrypted with the public key of the authorised user If a user is authorised to access a health record and requests access then the following process takes place:
In the case that a participant’s access is removed from a health record:
The symmetric key is decrypted with the private key of the owner of the EHR
The EHR is decrypted using the symmetric key
The record is re-encrypted with a new symmetric key
The symmetric key is encrypted with all the remaining authorised users’ public keys
The private key of the requesting user is used to decrypt the symmetric key for the EHR
The decrypted symmetric key is used to decrypt the patient’s EHR
Any interactions with health records are recorded as transactions on the network. Transactions are viewable only to the participants associated with the transaction. Here are examples of how transactions take place on HealthLink.
Data Structure
Hyperledger’s modelling language will be used to define the domain model for the network. Below are some examples from the .CTO file of how models will be defined and stored on the chain. These are subject to change depending upon different regulations and requirements in order to make the HealthLink platform HIPPA and GDPR compliant.
Participants
Assets
Personal Details
Relationship: Patient (Participant)
Practitioner’s public profile
Relationship: Practitioner (Participant)
Medical Record
Concepts
Address
Permission Definitions
Hyperledger Fabric includes an access control language (ACL), which defines access over the elements of the .CTO domain model above. By defining ACL rules we are able to control which resources participants have access to on the network’s domain model. Some examples of these access rules are shown below:
HealthLink API Platform
HealthLink will offer an API that will permit third parties to obtain and interact with EHRs with the user’s permission. All endpoints available in the UI will be available to developers. We hope to cultivate a robust ecosystem of applications and services.