HIPAA-Konformität

Beyond HIPAA Compliance

Security That Exceeds
Every Standard

Intake.Dental protects patient data with dual-layer encryption that goes far beyond HIPAA requirements. First, AES-256-GCM encrypts your data to military-grade standards. Then, TreeChain AI's quantum-proof polyglottal cipher transforms that encrypted output into strings of ancient symbols and mathematical glyphs — unreadable, unsearchable, and resistant to attacks from current and future quantum computers.

✓ HIPAA CompliantBAA with every practice
✓ AES-256-GCMMilitary-grade base layer
✓ TreeChain AIQuantum-proof glyph cipher
✓ AWS InfrastructureSOC 2 certified hosting
Proprietary Technology

Dual-Layer Encryption Architecture

Most healthcare platforms use a single layer of encryption. Intake.Dental first encrypts data with AES-256-GCM, then wraps that output in TreeChain AI's quantum-proof polyglottal cipher — creating defense-in-depth designed for the post-quantum era.

1

AES-256-GCM Encryption

Military-Grade Symmetric Encryption

Patient data is first encrypted with industry-standard AES-256-GCM using per-record Data Encryption Keys (DEK) and envelope encryption — meeting and exceeding HIPAA's technical safeguard requirements before the second layer is even applied.

AFTER LAYER 1:

gs_7f3a8b2c9e1d4f6a
b3e9d1f4a608c2d7e5

AES-256-GCM ciphertext with per-record DEK and envelope encryption

  • Per-record Data Encryption Keys (DEK) for forward secrecy
  • Central Key API with envelope encryption for key management
  • Tenant isolation via Additional Authenticated Data (AAD)
  • HMAC integrity verification prevents tampering
  • 128-bit IV and authentication tag per record
2

TreeChain Glyph Cipher

Quantum-Proof Polyglottal Encryption

After AES-256 encryption, TreeChain AI's proprietary polyglottal cipher transforms the already-encrypted output into sequences of ancient symbols, alchemical notation, and mathematical glyphs from writing systems spanning human history.

FINAL STORED OUTPUT:

⑨🜐🜟☥₮✍⁹☇ƀ❋❊Ŧ✞☐❼❇☋✈◈◇◆●○◐◑☀

Quantum-proof glyph strings — what's actually stored in the database

  • Data appears as meaningless symbols to any observer — human or machine
  • Polyglottal cipher resists brute force, frequency analysis, and quantum attacks
  • Emotion-keyed cipher modes generate unique encryption patterns
  • Each encryption generates a unique shield ID for audit trail verification
  • Even if the AES layer is broken, the glyph layer remains independently secure

Live Encryption Visualization

Watch patient data get encrypted through both layers

1
Patient Enters Data
SSN: 123-45-6789
Plaintext visible only on the patient's device
2
Layer 1 — AES-256-GCM Encryption
gs_7f3a8b2c9e1d4f6a…b3e9d1f4a608c2
Military-grade symmetric encryption with per-record DEK
3
Layer 2 — TreeChain Glyph Cipher
⑨🜐🜟☥₮✍⁹☇ƀ❋❊Ŧ✞☐❼❇☋✈
Quantum-proof polyglottal cipher transforms AES output into symbolic glyphs
4
Stored on Encrypted Infrastructure
⑨🜐🜟☥₮✍⁹☇ƀ❋❊Ŧ✞☐❼❇☋✈◈◇◆●○◐◑☀☁☂…
Glyph-encrypted data stored on HIPAA-compliant AWS — unreadable even to DB admins

What This Means for Your Practice

Even in a worst-case breach scenario, your patient data remains protected.

🔓

If AES-256 Keys Are Compromised

Decrypted output is still TreeChain glyph ciphertext — strings of ancient symbols that are independently encrypted and quantum-proof. No patient data is exposed.

🛡️

If TreeChain Is Compromised

The underlying AES-256-GCM encryption remains fully intact with per-record keys, HMAC integrity verification, and tenant-isolated key derivation. Data stays locked.

⚛️

Against Quantum Computers

TreeChain AI's polyglottal cipher is designed to resist quantum computing attacks. Your data encrypted today remains protected against tomorrow's technology.

Compliance

HIPAA Technical Safeguards — Exceeded

Every HIPAA requirement met and surpassed with additional protections.

🔐

Verschlüsselung im Ruhezustand

Exceeded

Dual-layer encryption (TreeChain + AES-256-GCM) on all PHI. AWS S3 server-side encryption as additional layer. HIPAA requires encryption; we provide three layers.

🔒

Encryption in Transit

Exceeded

TLS 1.3 for all data transmission. Practice subdomains served over HTTPS with HSTS. Data is encrypted before it ever leaves the patient's browser.

📋

Audit Controls

Exceeded

Comprehensive audit logging for every data access, modification, and administrative action. IP tracking, user agent logging, and timestamped records.

👤

Access Controls

Exceeded

Role-based access control (RBAC), unique user identification, automatic session timeout, and per-practice data isolation with row-level security.

🏢

Practice Isolation

Exceeded

Each practice operates in a completely isolated data environment. Dedicated subdomains, tenant-specific encryption keys, and row-level database security.

Integrity Controls

Exceeded

HMAC integrity verification on every encrypted record prevents unauthorized modification. Authenticated encryption (GCM mode) detects any data tampering.

📄

Geschäftspartnervertrag

Active

Executed BAA with every registered practice. BAAs maintained with all subcontractors including AWS, Supabase, Sikka AI, and payment processors.

🗑️

Data Disposal

Exceeded

Secure data deletion upon practice request or termination. Deletion certificates available. Encrypted backups purged within 90 days.

🔑

Key Management

Exceeded

Per-record Data Encryption Keys (DEK) with envelope encryption via central Key API. Tenant-isolated key derivation ensures cross-practice security.

⚡ 2025–2026 HIPAA Regulatory Updates

The biggest HIPAA Security Rule overhaul since 2013 is coming. New NPP deadlines, mandatory MFA, encryption requirements, and more. See how Intake.Dental keeps you ahead.

View Full HIPAA Updates Timeline →

About TreeChain AI & Glyphic Encryption

TreeChain AI is a proprietary encryption technology that operates as a second layer on top of standard AES-256-GCM encryption. Rather than relying solely on mathematical complexity that could be vulnerable to future quantum computing advances, TreeChain's polyglottal cipher takes AES-encrypted data and transforms it through a multi-dimensional mapping system that produces output as sequences of Unicode glyphs drawn from thousands of symbol sets — including alchemical notation, ancient mathematical symbols, astronomical signs, and writing systems from across human history.

The result is that what's actually stored in the database is not ciphertext in any traditional sense — it's streams of shapes and symbols (e.g., ⑨🜐🜟☥₮✍⁹☇ƀ❋❊Ŧ✞☐❼❇☋✈) that cannot be parsed, searched, indexed, or reverse-engineered by any known method, including quantum computing approaches. To recover the original data, an attacker would need to reverse the glyph cipher first, then break the AES-256-GCM encryption underneath — two completely independent cryptographic challenges.

Each encryption operation uses emotion-keyed cipher modes — named after philosophers (Aristotle, Plato, Socrates, Confucius, Kant, Descartes, Nietzsche, Spinoza) — that map to distinct cipher configurations, producing entirely different glyph patterns for the same input. This means that even identical data encrypted at different times produces completely different output, eliminating frequency analysis vulnerabilities.

🔐 Defense-in-Depth Guarantee

Because AES-256-GCM and TreeChain operate as fully independent encryption layers, an attacker would need to first reverse the glyph cipher, then break the AES encryption underneath. There is no known or theoretical attack that can defeat both layers concurrently.

Data Flow & Protection

Patient Intake Submission

When a patient submits a form on a practice's portal, the following security measures are applied automatically before the data is stored:

  • Form data is validated and sanitized on the server
  • PHI fields are individually encrypted with AES-256-GCM using a per-record DEK (Layer 1)
  • The AES-encrypted output is then transformed through TreeChain's glyph cipher (Layer 2) into quantum-proof symbolic strings
  • Plaintext PHI is immediately purged from memory — only encrypted data is stored
  • Display-safe glyph representations replace sensitive fields for dashboard viewing
  • Searchable HMAC hashes are generated for lookup without exposing plaintext (e.g., email_hash, phone_hash)
  • A full audit trail entry is created for HIPAA compliance

Data at Rest

Stored data is protected at three levels: AES-256-GCM envelope encryption, TreeChain glyph encryption, and AWS server-side encryption (SSE-S3). Even database administrators cannot read patient records because all PHI fields contain only encrypted glyph strings — shapes and symbols with no recognizable data.

Data in Transit

All communications are secured with TLS 1.3. Practice portals enforce HTTPS with HSTS. API calls between services use encrypted channels with certificate validation. Patient form data is encrypted in the browser before transmission when supported.

Business Associate Agreement (BAA)

Dental Education, Inc. executes a Business Associate Agreement with every registered practice, establishing our obligations under HIPAA for the protection of PHI. Our BAA covers all services provided through the Intake.Dental platform, including:

  • Digital patient intake forms and form submissions
  • PDF generation and document storage
  • Video consultations and teledentistry features
  • Practice Management System (PMS) integration via Sikka AI
  • Insurance verification services
  • Email notifications and patient communications

We also maintain BAAs with all subcontractors in our service chain, ensuring end-to-end HIPAA compliance throughout the data processing pipeline.

⚠️ Shared Responsibility

While Intake.Dental provides security infrastructure that exceeds HIPAA's technical safeguard requirements, each dental practice is a Covered Entity responsible for their own overall HIPAA compliance program. Practices must ensure:

  • Staff training on PHI handling and HIPAA procedures
  • Strong password policies and access credential management
  • Physical safeguards within their own facilities
  • Compliance with state-specific regulations, including teledentistry laws
  • Proper informed consent practices with patients
  • Incident response and breach notification procedures

Breach Notification

In the event of a confirmed security incident affecting PHI, Dental Education, Inc. will:

  • Notify affected practices within 72 hours of discovery
  • Provide a detailed incident report including scope, affected data, and timeline
  • Cooperate with the practice's breach notification obligations under the HIPAA Breach Notification Rule
  • Implement immediate remediation measures and document all corrective actions
  • Provide ongoing status updates until the incident is fully resolved

Note: Due to our dual-layer encryption architecture, even in the event of unauthorized database access, patient PHI would remain encrypted and unreadable, which may qualify as a safe harbor under the HIPAA Breach Notification Rule's encryption exception (45 CFR § 164.402).

ℹ️ Encryption Safe Harbor

Under HIPAA's Breach Notification Rule, if PHI is encrypted in accordance with NIST guidelines and the encryption keys have not been compromised, the incident may not constitute a reportable breach. Our dual-layer architecture provides two independent encryption systems — significantly strengthening the safe harbor position for practices using Intake.Dental.

Third-Party Integrations & Compliance

Sikka AI — Practice Management System Integration

PMS integration is provided through Sikka Software Corporation, which maintains its own HIPAA compliance program and BAA. Sikka AI enables connectivity to 30+ dental PMS platforms. All PHI transmitted through the integration is covered under our BAA chain.

Versicherungsüberprüfung

Real-time insurance eligibility verification is performed through HIPAA-compliant clearinghouse APIs using standard X12 EDI 270/271 transactions. Patient insurance data is transmitted securely and used solely for the purpose of eligibility verification on the practice's behalf.

Video Consultations

HIPAA-compliant video infrastructure with end-to-end encrypted transmission. Video content is not recorded or stored by Intake.Dental unless explicitly configured by the practice. See our Terms and Conditions Section 11 for full teledentistry terms.

Kontakt

For security or compliance questions:

Dental Education, Inc.

d/b/a Intake.Dental

Email: support@intake.dental

Website: https://intake.dental

Ready to Protect Your Practice?

Start your 14-day free trial. Full encryption. Full compliance. No contracts required.