-
Audit Event - Received Health Data:
Purpose:
Ensure that the VHL Receiver generates audit records when receiving and using a Verified Health Link (VHL) to retrieve health information, in support of accountability and traceability.
Description:
The VHL Receiver MAY record audit events for critical events during its handling of a VHL. These MAY include:
- Receipt of a VHL from a VHL Holder
- Verification of the VHL's digital signature and trust chain
- Use of the VHL to retrieve referenced health documents from a VHL Sharer
- Access, rendering, or internal processing of the retrieved documents
-
Create Secure Channel:
The VHL Sharer and VHL Receiver SHALL jointly establish a secure connection prior to executing any Verified Health Link (VHL) transactions involving the exchange of sensitive data.
This requirement is satisfied by implementing secure channel establishment as defined in the Audit Trail and Node Authentication (ATNA) Profile, specifically through the Authenticate Node [ITI-19] transaction.
This requirement entails:
- The VHL Receiver initiating a secure connection as the client and presenting valid credentials
- The VHL Sharer responding as the server, presenting its own credentials and validating the client's credentials against a trusted Certificate Authority or Trust Anchor
Establishing this secure channel ensures confidentiality, integrity, and bilateral authentication of all subsequent communications, and fulfills the trust obligations defined in the Establish Trust requirement.
-
Establish Trust:
Before participating in any Verified Health Link (VHL) transactions, the VHL Sharer and VHL Receiver SHALL establish a trust relationship based on shared acceptance of a designated Trust Anchor.
Trust is established by referencing and accepting public key material published and distributed in accordance with this specification ( via Retrieve Trust List Response).
All participants MUST validate digital signatures using keys that are anchored in the agreed trust framework.
-
Initiate Retrieve Trust List Request:
A VHL Sharer or VHL Receiver, as a participant in the trust network, SHALL be capable of retrieving public key infrastructure (PKI) material from a designated Trust Anchor.
The retrieved material MAY include:
- Public key certificates and associated trust lists
- Certificate revocation data (e.g., CRLs, OCSP responses)
- Metadata used to:
- Validate digital signatures on VHLs and related resources
- Establish secure connections
- Decrypt content protected via asymmetric encryption
Participants SHOULD cache the received trust list to reduce network and server load.
Preconditions:
- The requesting participant knows in advance the endpoint from which to retrieve PKI material, as published or distributed by the Trust Anchor.
-
Initiate Submit PKI Material Request:
When a VHL Sharer or VHL Receiver generates a new public-private key pair for use within the VHL trust network, they SHALL submit the corresponding public key material to the Trust Anchor for validation and inclusion in the trust list.
The submission MAY include metadata to support categorization of key usage (e.g., digital signatures, encryption, secure channels) and business or operational context.
-
Receive Trust List:
A VHL Sharer or VHL Receiver, after receiving PKI material from a Trust Anchor, SHALL validate and process the trust information for subsequent cryptographic operations.
Participants SHOULD:
- Cache the received trust list or certificate material to reduce network and server load
- Validate digital signatures or trust paths before use in VHL validation or secure channel sessions
- Monitor certificate expiration or revocation status where applicable
-
Request VHL Document:
The VHL Receiver SHALL initiate a request to retrieve a single health document from a VHL Sharer, using a previously received and validated Verified Health Link (VHL).
This transaction SHALL be conducted over a secure channel. Both the Receiver and Sharer SHALL validate each other's participation in the trust network using PKI material published by the Trust Anchor.
Optional behaviors:
- The VHL Receiver MAY verify the digital signature of the returned health document to confirm its authenticity, integrity, and provenance, as defined in the Verify Document Signature requirement.
- The VHL Sharer MAY record an audit event documenting the access request by the Receiver, in accordance with the Audit Event – Received Health Data requirement.
-
Request VHL Documents:
The VHL Receiver SHALL initiate a request to retrieve a set of health documents from a VHL Sharer, using a previously received and validated Verified Health Link (VHL).
Both the Receiver and Sharer SHALL validate each other's participation in the trust network using PKI material published by the Trust Anchor.
Optional behaviors:
-
Receive VHL authorization mechanism:
The VHL Receiver SHALL be capable of receiving a Verified Health Link (VHL) from a VHL Holder through a supported transport mechanism (e.g., QR code scan, direct URL, or digital message).
Upon receipt, the Receiver SHALL:
- Parse the VHL
- Validate its digital signature against a trusted key published by a recognized Trust Anchor
- Prepare to retrieve the associated health documents
Receipt of the VHL may occur through direct user interaction (e.g., scanning a QR code) or automated channels, depending on the implementation context.
-
Verify Document Signature:
The VHL Receiver, upon receiving a digitally signed health document from a VHL Sharer, MAY verify the document's digital signature using previously retrieved PKI material.
This verification process confirms the authenticity, integrity, and provenance of the document independently of the Verified Health Link (VHL) itself.
The public key used for this verification MAY:
- Originate from a different trust network than the one used to validate the VHL
- Be unrelated to the key used to validate the VHL signature
Implementers SHOULD consult cross-profile guidance regarding interoperability with the IHE Document Digital Signature (DSG) profile, particularly in cases where additional attestation, long-term non-repudiation, or multi-party signatures are involved.