{"id":4044,"date":"2019-04-17T17:28:31","date_gmt":"2019-04-17T14:28:31","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=4044"},"modified":"2021-10-11T19:52:54","modified_gmt":"2021-10-11T16:52:54","slug":"electronic-visit-verification-system","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/electronic-visit-verification-system\/","title":{"rendered":"Electronic Visit Verification  with Hardware Tokens"},"content":{"rendered":"\n<p>Protectimus multifactor authentication solution is an ingenious, versatile system that can be used in many ways, from helping <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.protectimus.com\/blog\/keycloak-multi-factor-authentication-hardware-tokens\/\" target=\"_blank\">developers implement two-factor authentication<\/a> on their apps and services to <a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">protecting an end user&#8217;s Office 365 account with the help of hardware tokens<\/a>.<\/p>\n\n\n\n<p>Our team made Protectimus system truly versatile, it could be customized to create even the most unconventional solutions to fit our clients\u2019 needs.<br><\/p>\n\n\n\n<p>In this article, we will describe in detail one such unconventional solution we created on the basis of Protectimus multifactor authentication \u2014 electronic visit verification system. You will learn what electronic visit verification actually is, where it is used and how the EVV solution from Protectimus works.<br><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<center><div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.protectimus.com\/evv\/?ref=EVV-article-button\" style=\"background-color:#269400\" target=\"_blank\" rel=\"noreferrer noopener\">Contact us for more information<\/a><\/div><\/center>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Is Electronic Visit Verification?<\/strong><\/h2>\n\n\n\n<p>Simply put, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Electronic_visit_verification\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">EVV<\/a> is an automated solution for home care workers that collects info on the time of attendance and all the necessary details of the care plan. Electronic visit verification software gives such care services as Home Health, Home Care and Hospices an easy and sustainable way of verifying visit activity (type of home care service, individuals receiving and providing the service, date, exact time and location the service was provided at) and ensuring the patients are never neglected, eliminating even the possibility of fraudulent home visit documents.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/04\/Electronic-Visit-Verification-System-with-Hardware-OTP-Tokens-1024x683.jpg\" alt=\"Electronic Visit Verification System with Hardware OTP Tokens Protectimus\" class=\"wp-image-4049\"\/><\/figure><\/div>\n\n\n\n<p>EVV is mandated by a number of states and recommended by those that do not mandate it. The system is widely used by most states and other payers, as it is a far more reliable and effective way of monitoring caregivers than any document signed by hand can be. And with the 21st Century CURES Act passed, it became a requirement for all homecare providing facilities to have EVV adopted by 2023.<br><\/p>\n\n\n\n<p>EVV was invented way back in the 90s, since then the technology has moved worlds ahead, so new ways of implementing EVV are currently in demand.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/why-is-healthcare-data-security-so-important\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Why is healthcare data security so important?<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How does Protectimus electronic visit verification system work?<\/strong><\/h2>\n\n\n\n<p>Time-based one-time passwords generation algorithm (TOTP) allows for calculating the exact time of when the used passwords were generated. This feature is what made it possible for us to build one of the most user-friendly EVV solutions on the market. Protectimus electronic visit verification system can be used with one of these hardware tokens: <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.protectimus.com\/protectimus-two\" target=\"_blank\">Protectimus Two<\/a>, <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.protectimus.com\/protectimus-slim-mini\" target=\"_blank\">Protectimus Slim<\/a> or <a href=\"https:\/\/www.protectimus.com\/protectimus-crystal\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Protectimus Crystal<\/a>.<br><\/p>\n\n\n\n<p>Here\u2019s how it all works exactly:<br><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>The homecare provider or facility delivers one of the above-mentioned hardware tokens to a patient\u2019s home. <\/li><li>When the appointed healthcare specialist comes for a visitation he or she needs to turn the token on, generate a one-time password and write the provided code down. <\/li><li>Once the home visit is done with the healthcare worker needs to generate a second TOTP and write it down as well.<\/li><li>These two one-time passwords have to be passed on to the Protectimus electronic visit verification system next. Doing it is very easy \u2014 the healthcare specialist simply needs to call a special number and enter the patient\u2019s id number and the two passwords generated during the home visit. The passwords can be sent over to the EVV system in bulk for all the patients visited in a day by the end of that day, or the call can be made after each and every visit.<\/li><li>After Protectimus EVV system receives the passwords, it analyses them and provides the healthcare facility (the payer) with the exact time the home visit started and the duration of the visit. Thus, the employer gets accurate info and full control.<\/li><\/ol>\n\n\n\n<p>As you can see Protectimus EVV solution is simple and elegant, like anything that\u2019s truly ingenious.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/why-universities-choose-hardware-tokens\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">Why US, Canadian, and EU Universities Choose Programmable Hardware OTP Tokens&nbsp;by&nbsp;Protectimus<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Makes Protectimus EVV System So Much Effective?<\/strong><\/h2>\n\n\n\n<p>Protectimus EVV solution meets both all the federal <a href=\"https:\/\/www.homecaremag.com\/news\/summarizing-evv-requirements\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">EVV Compliance Requirements<\/a> and HIPPA Compliance Requirements.<br><\/p>\n\n\n\n<p>Our solution eliminates fraud, ensures that certain patients receive the visit hours they are entitled to and ensures the payment claims are aligned with the real service delivery hours.<br><\/p>\n\n\n\n<p>EVV token allows to omit using the patient\u2019s phone for home health care time tracking and thus eliminates one point of unpleasantness for the patient.<br><\/p>\n\n\n\n<p>With Protectimus EVV there\u2019s no need to install any kind of device in the patient\u2019s home. All that needs to be done is have one tiny EVV token device delivered to the patient. And with no complex device required there\u2019s no need for any complicated software installations and annoying software updates.<br><\/p>\n\n\n\n<p>Protectimus is a versatile system that can be customized to fit any electronic visit verification requirements. We make all the features, graphics and reports available to our clients. And we are ready to create a truly unique solution based on Protectimus multifactor authentication to make sure it fits your particular business like a glove.<\/p>\n\n\n\n<p>With our cloud-based platform, the system can be accessed from anywhere and at any time. Protectimus provides comprehensive electronic documentation and ensures complete visibility, thus allowing you to improve both the individual care and internal operations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read more:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.protectimus.com\/blog\/gdpr-summary\/\">General Data Protection Regulation Summary<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/why-universities-choose-hardware-tokens\/\"><\/a><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/\">Hardware Tokens for Azure MFA<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/ransomware-to-pay-or-not-to-pay\/\"><\/a><a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">Man In The Middle Attack Prevention And Detection<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">Social Engineering: What It Is and Why It Works<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/ransomware-to-pay-or-not-to-pay\/\">Ransomware \u2013 to Pay or Not to Pay<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/digital-security-risks-fintech\/\">10 Steps to Eliminate Digital Security Risks in Fintech Project<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/byod-security-rules\/\">10 Basic BYOD Security Rules<\/a><\/li><\/ul>\n\n\n\n<p>Please, let us know if you have any questions in comments or via email&nbsp;<strong>support@protectimus.com<\/strong>.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Protectimus multifactor authentication solution is an ingenious, versatile system that can be used in many ways, from helping developers implement two-factor authentication on their apps and services to protecting an end user&#8217;s Office 365 account with the help of hardware tokens. Our team made Protectimus system truly versatile, it could be customized to create even [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15],"tags":[606,608,194,610],"class_list":["post-4044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","tag-electronic-visit-verification-en","tag-evv-en","tag-protectimus-en","tag-totp-en"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/4044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=4044"}],"version-history":[{"count":23,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/4044\/revisions"}],"predecessor-version":[{"id":7531,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/4044\/revisions\/7531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4635"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=4044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=4044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=4044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}