Securing the Health Data Supply Chain

Creating Verifiable, Fraud-free Data Exchange

Health Data Needs Help

Fraud harms patient outcomes and costs health systems time and money

%

INCREASE

In Healthcare Cyberattacks 2018-2022

MILLION

US Health Records Compromised Last Year

%

OF ATTACKS

Disrupted Care Delivery

Building the Authentic Web in Healthcare

We’re on a mission to make health data easy to share when you need to, and impossible to hack when you don’t.

Data Exchange

healthKERI uses the open standard KERI protocol for seamless integration with existing infrastructure and technologies. Meaning flexible interoperability without needing third-party authentication.

Security

Using public/private key pairs, healthKERI provides post-quantum safe credentials. Each data event is signed with a cryptographically verifiable digital signature, ensuring authenticity and data integrity.

Flexibility and Scalability

Solving the problem of today’s identity systems and distributed ledgers through low-code implementations on peer-to-peer transfers. Meaning healthKERI can scale to even your highest volume data exchanges.

Self-Certifying Identity

KERI’s structure is self-certifying, meaning you no longer need external certification authorities or centralized trust to verify that you are who you say you are.

Self-Governance

Through the use of ACDCs, you maintain control of your data governance instead of distributing it across a blockchain, meaning rapid, secure data exchange with regulators, payers, vendors and other third parties.

Privacy and Confidentiality

healthKERI’s technology provides for graduated disclosure and confidentiality allowing you to control the visibility of your data exchange. No need to share each transaction on a shared ledger.

Sign Everything

“It’s much easier to protect your keys than to try and secure the whole internet.” – Samuel Smith, Ph.D.

 

healthKERI’s “Sign Everything” motto means using cryptographically secure public/private key pairs to sign every event or exchange of data that occurs.


Every call, data request or action is auditable. It also means you no longer have to give short-lived bearer tokens prone to replay or broken object level authorization (BOLA) attacks.

Resources

 

Why healthKERI?

Data security isn’t just about the financial toll it takes on the healthcare system. It’s costing lives. Healthcare IT News reported in 2023 that 44.4% of ransomware attacks disrupt care delivery. 

For us, that makes this personal. After our founders came out on the other side of their own healthcare hurdles, we realized no tomorrow is promised and we need to start making a difference today.

 

Validating the Problem

We are only as safe as the least secure company that has access to any of our data. Hackers can use data stolen from companies with weak security to target employees and systems at other companies, including those with strong security protocols.

Professor Stuart E. Madnick, Ph.D.

The Rising Threat of Consumer Data in the Cloud

As a hacker who’s seen this same show before in other industries…I had a looming sense of fear that [in trying] to quickly meet the deadlines set by the ONC’s FHIR dictum, security would be left to an afterthought.

Alissa Knight

Playing with FHIR: Hacking and Securing FHIR API Implementations

Reach Out

l

Contact Us