Network-Based Information Management System for The Creation, Production, Fulfillment, and Delivery of Prescription Medications And Other Complex
Products and Services
BACKGROUND OF THE INVENTION
TECHNICAL FIELD
The invention relates to information management systems. More particularly, the invention relates to a network based information management system for the creation, production, fulfillment, storage, processing, and delivery of complex products and services with participation of multiple parties and requiring high levels of security, authentication, confidentiality, and non- repudiation, such as prescription medications and medical records.
DESCRIPTION OF THE PRIOR ART
Significant advances are being made in the information technologies, including computing hardware platforms, local area networks (LANs), wide area networks (WANs), Internet connectivity, wireless communication, portable computing devices, powerful operating systems, user-friendly internet browsers and search engines, relational and object-oriented databases capable of efficiently handling large amount of data, advanced encryption protocols for secure communication of confidential information on public networks, and cost-effective and practical authentication and logging methods for secure transaction execution with acceptable tracking and non-repudiation
According to recent statistics from many health care and insurance organizations, healthcare is the largest single sector of the U.S. economy of approximately $ 1 trillion of annual spending, or over 14% of the nation's gross domestic product. Medication covers over 12 to 15% of the healthcare spending in the U.S.
Healthcare managed operations (HMOs) have recently made significant progress in containing the rapidly escalating costs of hospital, clinic, medical testing/diagnosis, and physician care. The processes for prescription medication creation and fulfillment continue to be fragmented and inefficient. The present workflow of the prescription medication creation and fulfillment has not benefited from any significant automation and process improvement. Presently, there are about 850,000 prescribers, including 650,000 physicians, writing over 2.5 billion prescriptions per year in the U.S.
In practice, the prescriber, after diagnosing the patient, manually writes a prescription on a paper pad, with a notation in the patient's medical chart, usually without complete access to the latest medical records of the patient from other medical organizations, or access to the relevant formulary and generic programs of the healthcare insurance provider, or access to the latest medication information from pharmaceutical manufacturers or healthcare research centers.
The patient then takes the written prescription to a retail pharmacy in the neighborhood for same day fulfillment. Retail pharmacies typically fill prescriptions for up to thirty days. The pharmacist enters the written prescription manually into the pharmacy computer and database system. A computer company provides an electronic connection between the pharmacy and the proper Pharmaceutical Benefit Manager (PBM) according to the patient insurance card, if the patient is insured.
At this point, the formulary and/or generic drug programs of the insurance provider may be displayed to the pharmacist. If the prescriber had not reviewed and selected from the formulary and/or generic drug programs, it is inefficient at this point to make changes in the prescription because the patient usually prefers to consult the physician/prescriber first, which is time consuming. The pharmacist may call the prescriber to change the prescription. However, to minimize waiting time, the patient in most cases ends up buying the prescribed medication at a higher co-payment. Because of such low compliance to formulary and generic programs, the cost of fulfilling the prescription is also higher for the insurance provider.
Once the prescription is fulfilled, the PBM takes responsibility for invoicing and collecting payment from the appropriate healthcare insurance companies, government, and/or employers and makes payments to the pharmacies on a monthly basis.
The patient or prescriber can also send the prescription by mail or fax to a mail order pharmacy for up to three months fulfillment. This approach results usually in a lower co-payment and is of less cost to the healthcare insurer. The mail order pharmacy must confirm the authenticity of the received prescription by calling the physician directly to meet the code and guidelines of the Federal and State pharmaceutical boards. The mail order pharmacist then follows the same steps as the retail pharmacist as described above with the same inefficiencies.
The code, laws, rules and regulations of the State and Federal pharmacy boards for the transmission of prescription medication are summarized below:
A medication prescription can be oral, written, or electronically transmitted. Electronic transmission of the prescription includes both images and data. An electronic image transmission prescription must comprise a facsimile of the prescription order that includes the physician's signature, name,
address, telephone number, license classification, and federal registry number (if a controlled substance is prescribed); the name and address of the patient; and the name and quantity of the drug, directions for use, and the date of issuance.
An electronic data transmission prescription comprises any prescription order, other than electronic image transmission prescription, that is electronically transmitted from a licensed prescriber to a pharmacy. This includes electronic, or e-mail on private or public networks.
For oral or electronic transmission, the pharmacist or furnisher must take appropriate steps to determine that the person who transmits and prescribes the prescription is authorized to do so. The pharmacist must record the name of the person who transfers the order. This does not apply to orders for Schedule II controlled substances, as they have considerably more stringent requirements.
For dangerous drugs, except for any Schedule II controlled substance, a written order of the prescriber that contains at least the name and address of the prescriber, name and address of patient, name and quantity of drug, direction of use, and date of issue may be treated as a prescription by the dispensing pharmacist, as long as additional information of the prescriber is readily retrievable in the pharmacy.
Facsimile copies of the prescriptions are acceptable as long as the pharmacist can call the prescriber, if needed, to authenticate and verify the information contained therein.
Facsimile transmission is considered secure because it is a point-to-point communication. However, transmitting prescriptions on public networks, such as the Internet, is not considered secure because it is difficult to ensure the authenticity of the prescriber and to maintain the confidentiality of
information in the prescription relating to the patient.
J. Edelson, C. Mayaud, Prescription Creation System, U.S. Patent No. 5,737,539 (7 April 1998) disclose an electronic prescription creation system for use by professional prescribers at the point of care which has a prescription division subsystem that permits creation of a single prescription which is automatically divided into two components for fulfillment of one portion quickly and locally at higher cost and of another portion by remote mail order, thereby taking more time but providing a cost saving for a major part of the prescription. Edelson et al do not address the issues of authentication and non-repudiation. Rather, they teach that "better security, in terms of ensuring that the filled prescription is released to the intended patient, or their agent, may be provided, by treating an electronic prescription transmission to a pharmacy as an advisory against which fulfillment may be initiated, wile the prescription is released only in exchange for a manually signed hard (paper) copy."
C. Mayaud, Prescription Management System, U.S. Patent No. 5,845,255 (1 December 1998) disclose an electronic prescription creation system. However,, Mayaud does not teach an electronic prescription delivery system that addresses the issues of security, authentication, and non-repudiation.
Other electronic prescription systems have suggested that a facsimile transmission may be used to provide an authenticated copy of a prescription. However, such facsimile transmissions comprises documents that are easy to forge. Accordingly, the pharmacist is compelled to telephone the prescriber and verify that the prescription was in fact written.
It would be advantageous to provide the confidentiality, authentication, and non-repudiation needed to meet the code requirements of Federal and State pharmaceutical and medical boards for the transmission of prescription medication and patient medical records using private or public
networks, such as the Internet, between all the parties involved, such as prescribers, physicians, patients, pharmacies, PBMs, third-party payers (insurance companies, employers, government), and pharmaceutical companies.
SUMMARY OF THE INVENTION The invention provides a solution to the inefficiency problems attendant with the workflows associated with the manual creation and fulfillment of prescriptions for medication, and of the manual creation of confidential patient health information. The invention uses the latest network based information technologies, advanced encryption protocols for secure communication of confidential information on public networks, and cost effective and practical authentication and logging methods for secure transaction execution with acceptable tracking and non-repudiation.
The invention provides an information management system that uses electronic transmission methods for the communication of prescriptions for medication and confidential patient records and information over public networks while meeting the code requirements of Federal and State pharmaceutical and medical boards.
The invention applies various encryption and authentication methods, including asymmetric signature and encryption algorithms (those that use public-private key-pairs), symmetric encryption algorithms (using a shared secret key), cryptographic keyed and un-keyed one-way hash functions, and other, non-cryptographic means, such as the image of the prescriber's physical signature and/or images of other transaction participant's physical signature, to achieve the required levels of security, confidentiality, non- repudiation, and authentication. The images of the physical signatures are optionally used to provide a human-readable confirmation of the authentication of the digital signatures of electronically transmitted documents and messages. Thus, the code requirements of Federal and State
pharmaceutical boards can be met. Such methods have security, confidentiality, and authentication superior to facsimile transmission, which is accepted and commonly used now for transmitting and fulfilling prescriptions for medication in most States (over 39 States presently) of the United States. Facsimile transmission is considered secure because it is a point-to-point communication, and is acceptable as long as the pharmacist can telephone the prescriber, if needed, to authenticate and verify the information contained therein.
Such capabilities enable new information management systems to automate and improve the efficiency of the work flows for the creation and fulfillment of prescriptions for medication and for healthcare information; and the interaction between prescribers, patients, pharmacies, PBMs (Pharmaceutical Benefit Managers), and pharmaceutical companies, with the following benefits:
• Physicians and other prescribers, who are the decision-makers with regard to the prescription of medication, can prescribe and send prescriptions to pharmacists more efficiently and with more awareness into the patient's complete medical history. The invention also provides the latest information concerning prescription medication from stored medical history databases, including other physicians' medical treatment as well as relevant formulary, generic, and compliance programs of third party payers.
• Patients have more efficient and convenient dispensing of medication either from mail order or retail pharmacy, in a transparent way, e.g. where the prescription is electronically transmitted directly from the physician's office without logistics of faxing, mailing, telephone call delays, or delays in mail order medication delivery. An immediate short-term supply of the prescribed medication can be obtained from physician's samples or from a local retail pharmacy. The electronic prescription can also be electronically transmitted to a retail pharmacy directly and the
patient can pick up the prescribed medication the same day for use until the mail order delivery of the rest of the prescription is received. Patients can also save money by using a mail order pharmacy.
• Pharmacies can fulfill prescriptions more efficiently from the electronically transmitted data. Automated integration of the prescribing and fulfillment systems dramatically reduces the likelihood of transcription errors by the pharmacist, decreases the cost, and improves the efficiency of prescription fulfillment.
Third party payers, e.g. insurance companies, government agencies, and employers, also save money because this invention provides a more transparent use of mail order and prospective management of higher formulary and higher generic compliance.
In addition more complete medical information is available to those making healthcare decisions at the point of care, resulting in more efficient and higher quality medical treatment.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a block schematic diagram showing an information management system for the preferred embodiment of the prescription medication system and illustrates the logical relationships and the information communication across a network between the key entities during a prescription creation and fulfillment process;
Fig. 2 is a flow chart showing the creation and fulfillment of a prescription for medication in the information management system shown on Fig. 1 ;
Fig. 3 is a flow diagram showing a process for sending and receiving prescriptions for medication to achieve the security, authentication,
and non-repudiation that is necessary to satisfy the code requirements of Federal and State pharmaceutical and medical boards in accordance with the invention.
Fig. 4 is a flow diagram showing the general system configuration and hierarchical levels of authentication in accordance with the invention;
Fig. 5 details system access controls and required authentication levels, where all authentication levels can use two-factors except for application managers in accordance with the invention; and
Fig. 6 is a flow diagram showing a presently preferred procedure employed in meeting the code requirements of Federal and State pharmaceutical and medical boards in accordance with the invention.
DETAILED DESCRIPTION OF THE INVENTION
This invention relates to the application of leading-edge network-based information technologies and recent advances of encryption and digital signature schemes to the creation of specifications, and to the development, production, fulfillment, delivery, and management of complex products and services which require:
• Detailed latest versions of products and services information, and/or
• Historical customer/product/services information, and/or
• Latest and current contract information, and/or
• Latest options for production and delivery alternatives, and/or
• From multiple, extensive, diverse, or remote information
sources, and/or
• With high requirements of information-security, and/or source authentication, and/or transaction tracking/logging/security/non- repudiation.
The herein disclosed application of leading edge network based information technologies results in more efficient, economic, and accurate creation, implementation, and delivery of complex products and services for the sources and parties involved.
Examples of such products and services which benefit from applications of the herein-described invention include:
• Creation of prescriptions and the delivery of medication;
• Diagnosis and solution of equipment malfunctioning where sensitive and confidential information is involved;
• Ordering and communication of results for medical laboratory tests, radiation tests, and remedies;
• Patient medical records;
• Diagnosis, testing, and remedy of diseases;
• Ordering of restricted products and services with complex contract requirements and/or Federal/State restrictions, such as firearms, and hazardous materials; and
• O r d e r i n g o f agricultural/veterinary supplies and
materials.
The preferred embodiment of the invention, described in more detail below, is for a medication prescription and healthcare management system to create a more automated workflow, which provides:
• More efficient prescribing of medication by physicians and prescribers, and higher quality of patient care with more available data on patient medical history;
• Latest medication information from pharmaceutical companies and research sources; and most recent patient insurance coverage information, including formulary and generic compliance programs;
• More efficient and cost effective fulfillment of medication by the pharmacist, better cost saving for health care insurance companies from better results of formulary, generic, mail-order for maintenance drugs, and patient compliance programs;
• Secure storage and convenient retrieval of more complete medical and health information at the point of care, resulting in higher quality of health care; and
• More efficient prescription fulfillment through retail and mail order channels with lower cost for the patients, resulting from the integration of the electronic prescribing, transmission, and fulfillment systems.
It should be clear to those skilled in the art how to implement the preferred embodiment of the invention from the disclosure herein and to provide other applications and workflow in accordance with the invention herein.
Fig. 1 is a block schematic diagram of an information management system for the presently preferred embodiment of a medication prescription system 10, illustrating the logical relationships and the communication of information across a network 13 between key entities of the invention during a prescription creation and fulfillment process.
A central server (CS) 15 is accessible through a network 13, such as the Internet, e.g. the World Wide Web, or any other private or public network, from each authorized prescriber's office 17 via an access device 22, such as a computer terminal, a PC connected with a modem, or a portable hand-held device. The network 13 may have any logical or physical configuration as long as each key entity has communication access to the CS. The CS registers and issues unique cryptographic keys for each qualified prescriber. These cryptographic keys may be either asymmetric keys (pair of public and private digital encryption keys used with an asymmetric cryptographic algorithm), or symmetric keys (shared secret digital encryption keys used with a symmetric cryptographic algorithm or with a keyed one-way hash function). The CS stores these keys and the registration information in a secure database 21 at the CS. The registration for each prescriber includes all the relevant and necessary information, such as name, address, qualification, drug registration number, and signature image, and may also include a mechanism for performing frequent verification of the validity of the drug registration number. Each prescriber has access to their aforementioned unique cryptographic key via a privately selected user name/password scheme or other commonly known authenticated access scheme (such as signature recognition or other biometric authentication scheme including finger-prints, eye-retina scans, or voice recognition).
In the presently preferred embodiment of the invention, the CS also registers and issues unique cryptographic keys similar to those mentioned above for each participating retail pharmacy 12 and mail order pharmacy 14. The CS also keeps in its secure database t h e aforementioned unique
cryptographic keys and the registration information including all the necessary and relevant information about the qualification and registration of the pharmacy.
The CS also creates a private database 23 for each patient 19, including personal information, healthcare insurance coverage, and relevant medical/drug historical information. The patient database is a virtual medical record (VMR) which grows with time. The patient database is protected by controlled secure access, such that its contents are only available to healthcare providers, prescribers, pharmacists, insurance providers, and the patient, with proper security code as authorized by the patient.
The CS has access to the participating PBMs 20, including access to all of the latest information on the insurance coverage of the patients, and on relevant formulary and generic programs. The CS has also access to the latest medication and drug information from the pharmaceutical manufacturers and healthcare research and information centers.
Additional access to the CS in the presently preferred embodiment of the invention may also include any of the following:
• Patients 19 may have the option to participate in the secured access to the CS by registering and having assigned unique cryptographic keys, analogous to those mentioned above, for controlled access to their medical records, for inquiry on status of prescription fulfillment, reorder of prescribed medication, and/or information about latest medication, diseases, and medical treatments.
• Healthcare insurance providers 18 may have the option to participate in the secured controlled access to the CS by registering with the CS and having assigned unique cryptographic keys, analogous to those mentioned above, for controlled access to the medical records of their
covered patients for coverage approval purposes, data collection or any other approved purposes.
• Pharmaceutical manufacturers 1 1 may also have the option to participate in selected secured controlled access to the CS by registering and having the CS assign unique cryptographic keys, analogous to those mentioned above, for controlled access to statistical medical or medication usage information, without violating the privacy and security of patient records.
The availability of all the above described information in a secure and scalable database, along with the controlled, secured, authenticated, and highly available access to all the various sources and parties involved in the prescription and medical records creation and fulfillment process, allows the invention to provide higher efficiency, lower cost, and more convenience for all the parties.
Fig. 2 is a flow chart showing a process for the creation and fulfillment of a prescription for medication in accordance with the information management system shown in Fig. 1. According to this embodiment of the invention, the following workflow for the creation and fulfillment of a prescription for medication occurs:
The prescriber makes a diagnosis of the patient(100) and is ready to prescribe the proper medication.
To select the proper prescription medication, the prescriber accesses the CS (102) using a computer terminal or portable device in the prescriber's office or with any other suitable electronic device, and brings up the patient VMR, insurance coverage information, and formulary and generic programs, as well as the latest information on medication from pharmaceutical companies and research centers.
The prescriber examines the patient's relevant medical history and any relevant formulary, generic, and compliance programs (104). For a new patient, all the new relevant medical, personnel, and insurance coverage information of the patient can be entered in the CS by the prescriber or his/her assistant, so that it will not have to be re-entered again by other participants.
The prescriber enters the diagnosis of the patient and can review the latest available information about all the relevant medications from the pharmaceutical manufacturers and medical research centers related to this diagnosis. The prescriber also can review any relevant formulary, generic, and compliance programs. The prescriber selects and enters the optimum prescription medication (106) according to all the available data, including the patient information, diagnosis, condition, treatment objectives, medication name and dosage, and treatment directions and details.
The patient selects (108) either a local retail pharmacy, a mail order pharmacy, or both, for the fulfillment of the prescription for medication. The retail pharmacy is convenient for less than a thirty-day supply presently, and same day fulfillment. The mail order pharmacy is more convenient for maintenance and chronic medication as it provides a ninety-day supply with less co-payment, a lower prescription price, and more convenient mail order refill. The patient may select a portion of the prescription to be fulfilled from a retail pharmacy for immediate use for few days until the rest of the prescription is fulfilled by the mail order pharmacy at lower cost. The patient may also use a short-term supply of prescription medication provided by prescriber's samples until the mail order medication is received.
The prescriber transmits electronically the prescription for medication to the CS, secured using encryption and digital signature schemes disclosed below (110).
The CS decrypts and electronically authenticates the received electronic
prescription for medication (1 12). Such decryption and authentication can be done automatically, and without the need of manual intervention. The CS transmits electronically the prescription to the selected retail and/or mail order pharmacy using the encryption and digital signature schemes disclosed below (114) in connection with Fig. 6.
The retail and/or the mail order pharmacy receives the electronically transmitted prescription (1 16; 138) and feeds the prescription electronic information directly into an electronic software system. . This can be done automatically and without the need for manual intervention.
Decryption and authentication of the prescription medication received from the CS at the retail pharmacy and/or mail order pharmacy can be performed automatically (118; 140). The prescription and the authentication confirmation, and an optional image signature of the prescriber (either stored at the CS or electronically transmitted), are stored in an electronic secure database and/or in printed formats.
The retail and/or mail order pharmacy fulfills the prescription (120; 142) from the electronic data received. This can be done automatically without manual intervention, and without the need to make adjustments for compliance with formulary and generic programs, and without the need to call the prescriber for confirmation and authentication. This results in significant efficiency improvement in operation.
The retail and/or mail order pharmacy delivers the medication to the patient and collects the payment from the patient, PBMs, and/or insurance companies using commonly accepted collection practices (122; 144).
The patient can access the CS (124) for medical information about the medication, diseases, or for tracking the status of the prescription. The patient can also order refills of the prescription by electronic
transmission to the CS. Proper priority for secure access is given to different users and participants of the system.
The CS confirms the refill request (126) with the prescriber by electronic transmission with similar encryption and authentication methods as described below.
The CS electronically transmits the confirmed and authenticated refill prescription to the selected retail and/or mail order pharmacy (128) and updates the VMR.
Following the same procedure disclosed above, the selected retail and/or mail order pharmacy refills the prescription (130; 132).
Following the same procedure disclosed above, the refilled prescription is delivered to the patient (136; 134) and the payment is collected from patient, PBMs, and/or insurance companies using commonly accepted collection practices.
Fig. 3 is a flow diagram which shows the application of encryption and authentication methods (such as the use of asymmetric public-private key pair algorithms, symmetric shared secret key algorithms, or any other encryption and authentication methods), with an optional prescriber's physical signature, to achieve the required security, confidentiality, non-repudiation, and authentication that is necessary to satisfy the code requirements of Federal and State pharmaceutical and medical boards.
Fig. 3 illustrates secure electronic transmission of the prescription from the prescriber to the CS, and then from the CS to the dispensing pharmacy. The prescription is encoded (300) using a standardized format that can be electronically transmitted through the network and automatically processed by the prescriber, CS, and dispensing pharmacy. The encoded prescription
is digitally signed by the prescriber (300). The signed, encoded prescription is encrypted for transmission over the network (310). The CS receives and decrypts the prescription, authenticates the prescriber signature, adds its digital signature to the prescription, if need be, and otherwise prepares the prescription for transmission to the selected pharmacy (320). The CS next encrypts the prescription, with its attached digital signatures, for transmission over the network (330). The pharmacy receives and decrypts the transmission, authenticates the prescriber, and fulfills the prescription by dispensing the medication to the patient (340).
Fig. 4 illustrates an example implementation of a CS showing methods of security, access control, availability, and reliability. The CS 400 is implemented using one or more software applications, running on one or more hardware server platforms, in a controlled access, physically secure environment. In the preferred embodiment of the invention, system administrators 401 who are authorized physical access to the hardware to perform routine functions, including system maintenance, backup, and monitoring, are required to use strong, two-factor authentication 402 involving a password and one other method, such as possession of a physical token or biometric verification. Application managers 403 authorized to maintain access controls for participants to applications and data, or to access databases containing sensitive information, are required to use an additional authentication factor over and above that required by system administrators.
The CS implements security policies designed to protect the privacy and safeguard the confidentiality of sensitive information entrusted to it. Examples of such information include patient records and participant business practices. These policies are enforced using a combination of data encryption and operating system and database access controls 411. Participants who access the CS, including patients 404, clinics 405, payment centers 406, pharmacies 407, research centers 408, insurance companies 409, and hospitals 410, are required to authenticate themselves using, at a
minimum, an appropriate password transferred over a secure, encrypted communications channel. In some cases, additional authentication factors are used. The CS itself uses a method such as a public key digital signature to authenticate itself to participants and establish the secure, encrypted communications channel.
Fig. 5 illustrates the physical and logical security policies for application 501 and database 502 servers, and for the database image itself 503. Server computers are physically protected within a controlled environment 500 requiring proper (e.g. two-factor) authentication for physical access. All such access is logged. To stop potential attacks on the server and the applications it runs from unidentified sources on the network 505, a firewall 504 is used to provide a logical perimeter. Both packet filtering and application level filtering can be used. Mirroring of the database 503 can be performed for reliable operation.
The procedure employed in the preferred embodiment of the invention applying encryption and authentication schemes for meeting the code requirements of Federal and State pharmaceutical and medical boards described above is as follows (see Fig. 6):
The CS receives an encrypted prescription, and the digital signatures that are necessary to authenticate the prescription, and then sends them to the selected mail order or retail pharmacy.
1. Each participating prescriber and pharmacy is assigned a unique cryptographic key, such as asymmetric private-public key-pair, symmetric shared secret key, or any encryption scheme. (600).
2. An option to provide humanly readable verification of authentication is to use the digitized signature image of the prescriber and store it at the prescriber's computer and/or at the CS central
office in secure data storage (602).
3. A digital signature can be made with various well-known schemes, such as by encrypting a hash code (or message digest) of the original prescription using the prescriber's asymmetric private key, or creating a message digest using the prescriber's symmetric shared secret key and a suitable keyed hash algorithm. The prescriber's digital signature is electronically transmitted to the CS (604).
4. The prescription for medication, along with a time stamp, and an optional image of the prescriber's signature, is encrypted and transmitted electronically to the CS (606). The encryption method can employ one of a variety of schemes consistent with practice of the art, including use of a standard security protocol (e.g. Secure
Sockets Layer, or SSL).
Note: Steps 3 and 4 above can be transmitted together or they can be transmitted separately.
5. At the CS, the message containing the prescription is decrypted to obtain the original, plaintext prescription. (608).
6. Authentication of the prescriber digital signature in the case of the use of an asymmetric public key encryption algorithm is accomplished by first computing the hash code over the decrypted received prescription (610). In the case of a symmetric key algorithm, the keyed hash is computed using the shared secret key.
7. Next, the received digital signature is decrypted using the prescriber's asymmetric public key or the prescriber's symmetric shared secret key. (612).
8. Next, the successful comparison between the hash code computed over the received decrypted prescription (from Step 6 above) with the hash code decrypted in the received digital signature (from Step 7 above) provides the required digital signature or proof-or-origin authentication of the prescriber (614). An optional confirmation of the reception, successful decryption and authentication of the prescription may be sent by the CS to the prescriber electronically, encrypted and authenticated using methods such as those outlined above.
9. With the digital authentication of the prescriber, the image of the prescriber's signature from either the CS database or from the decrypted transmitted prescription is optionally placed on the prescription, thereby providing an electronic image that is identical to that of a facsimile transmission, and is humanly readable. The electronic and hard copies are filed with the CS and/or with the selected pharmacy dispensing the medication (616). This step provides authentication that meets and exceeds the code requirement of the majority of State and Federal pharmaceutical boards equivalent to the facsimile transmission.
10. The CS can provide its own digital signature over the authenticated prescription, including with it the prescriber name and all relevant information, using a digital signature scheme such as one described above.. This digital signature is electronically transmitted to the selected retail and/or mail order pharmacy (618).
11. The CS sends the request of the prescription with a time stamp over the network to the selected mail order or retail pharmacy, encrypted and authenticated using methods similar to those outlined above (6420).
12. The selected pharmacy decrypts the prescription , which, once in plaintext form, can be printed with the image of the prescriber's signature, after completing the authentication of the CS in Step 13 below (622).
13. Authentication of the digital signature from the CS can be performed according to the digital signature at the CS, as in Steps 6, 7, and 8 above (624). The mail order and/or retail pharmacy has the option to perform this digital authentication automatically without the need of manual intervention.
14. After confirming the authentication of the digital signature of the CS, the mail order and/or retail pharmacy dispenses the medication by mail or directly to patient (as requested) (626). An optional confirmation of the successful reception, decryption, authentication, and fulfillment of the prescription is electronically sent to the CS, and in turn optionally sent to the prescriber for archiving and non- repudiation purposes.
Notice that the prescription printed at the dispensing pharmacy and the CS can optionally include the image of the prescriber's signature from either the stored image in the secured database of the CS or the transmitted image from the prescriber's computer. The pharmacy and/or the CS can store for the prescription and the confirmation of fulfillment the printed copy of in their files, and/or the electronic image in their computer memory database, for up to seven years or longer as required.
Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other implementations and other applications may be substituted for those set forth herein without departing from the spirit and scope of the present
invention. Accordingly, the invention should only be limited by the Claims included below.