The Healthcare Network
PHI doesn’t belong on
someone else’s tunnel.
CH VPN™ is Conceptual Health®’s clean-room enterprise mesh tunnel. Built for 10,000 clinics. Tuned for HIPAA. Certificate-rotated every 24 hours. No third-party brand under our wire.
Topology
Three planes.
One protocol.
CH VPN deploys as a federated hub-and-spoke with mesh bridges. The unit of administration is the tenant. The unit of trust is the certificate. Each plane has its own purpose, its own scale ceiling, and its own rotation cadence.
Peer Taxonomy
Six roles.
Six rotation cadences.
Every peer is one of six canonical roles. Each role has its own provisioning path, its own rotation schedule, and its own telemetry shape. The Authority enforces the difference.
| Role | Platform | Rotation | Plane | Per tenant |
|---|---|---|---|---|
| CHPeerRole.PatientDevice | iOS · Android | 24h | hub | 1,000–20,000 |
| CHPeerRole.ProviderPhone | Android (Device-Owner) | 24h | hub | 10–200 |
| CHPeerRole.ClinicianLaptop | macOS · Windows | 24h | hub | 5–50 |
| CHPeerRole.ClinicHubNode | Linux (systemd) | 7d | hub + mesh | 1–4 / site |
| CHPeerRole.CorporateGateway | Linux (HSM cluster) | 30d | corporate | ~30 global |
| CHPeerRole.SpecialistContractor | macOS · Windows | 8h | hub (federated) | 1–1,000 |
Cryptography
Public primitives.
Clean-room implementation.
CH VPN uses public cryptographic primitives. The handshake is an IK-pattern Noise construction. The data channel uses authenticated encryption with associated data. The selection is auditable, modern, and ready to migrate to post-quantum primitives when standards land. Every line of crypto code is ours. We ship no third-party brand.
Scale
The numbers,
on the record.
No mystery. No marketing math. These are the design ceilings and operating envelopes documented in the protocol spec.
Defense in Depth
Four layers.
Every one of them ours.
The tunnel is the floor. Above it: services authenticate. Above that: the Authority decides who is who. Above that again: an audit chain that survives compromise of any single layer. Each layer is implemented by Conceptual Health. Each layer is reviewed independently.
Platforms
One protocol.
Six platforms.
Each client is a clean-room implementation of the same wire format. Same crypto core. Same authority protocol. Same audit shape. Per-platform identifiers from the brand spec.
Access
Four ways
to deploy.
Bundled with the clinical software, per-clinic add-on, self-hosted authority, or federal FIPS path. Pick the shape. The protocol is the same.
- Included with Conceptual Healthcare seats
- Patient and clinician clients pre-provisioned
- Tenant-isolated authority slot
- BAA covered by parent agreement
- Independent clinic without CH EHR
- Tenant-isolated authority
- Up to 4 clinic hub nodes
- BAA included
- Authority deployed inside your perimeter
- Custom rotation policy
- Audit chain in your storage
- Optional air-gapped operation
- Validated FIPS crypto module
- AES-256-GCM, P-384, SHA-384
- FedRAMP roadmap
- Dedicated authority cluster