The patient’s real name and address can be restored
by tracking his insurant’s id. With the id and the
timestamp from the signature of the prescription it
should be possible to receive the right insurance
company’s information. Therefore, backtracking and
reconstruction is always possible, however it will
take some time and hence be costly.
How can these Costs be Saved?
Actually, there is no need to copy patient’s personal
information, insurance data or dispensing person’s
data into the prescription as it is already stored at the
eHC. Therefore, the avoidance of creating duplicate
information would not only save storage space, but
also reduce risks.
How to Deal with Prescriptions for Third Persons
and Consumables for a Doctor's Surgery?
In these special cases, a flag should be set which
informs the pharmacist. Only then it should be
allowed to add extra information about the receiving
third persons.
6 CONCLUSIONS
In this paper, we presented different scenarios,
which show that the functions of the German
electronic health card’s peripheral parts can be
abused. Three possible attacks were presented:
- Automatic pairing of card readers and
connector without administrative guidance
- Misuse of encryption and signing
- Creating inconsistent prescriptions
Possible solutions were given and further
questions discussed. The automatic pairing function
would need to be deactivated at the connector, which
will hardly cost anything. Therefore, this should be
done immediately. Preventing misuse of
functionality and creation of inconsistent
prescription might prove to be more costly. The
scenarios mentioned in this paper should be included
in the overall security specification in order to make
people aware of the possible risks.
As the German electronic health card is currently
on hold and redesigned in parts, security related
parts will have to be reconsidered and newly
checked once the moratorium ends. As presented in
this paper, there is not only a need for proving
information security, but the absence of possibilities
to abuse functions must be checked, too.
Furthermore, a security analysis concerning the
central parts as well as the use and play of value-
added-applications has to be performed.
REFERENCES
Bales, S., 2003. Die Einführung der Telematik im
Gesundheitswesen als Herausforderung für die
Weiterentwicklung der Patientenrechte in
Deutschland. [Talk] Bonn: gematik. Available at:
http://www.dimdi.de/dynamic/de/ehealth/karte/downlo
adcenter/veroeffentlichungen/vortraege/bagh-bonn-
bal-031107.pdf [Accessed 9 September 2008].
Berg, W., 2004. Telemedizin und Datenschutz.
Medizinrecht, 22 (8), pp. 411-414.
BSI, Bundesamt für Sicherheit in der Informationstechnik,
2004. Studie zu ISO-Normungsaktivitten ISO/BPM -
Anforderungen an Information Security Management
Systeme.
Caumanns, J. et al., 2006. Die eGK-Lösungsarchitektur
Architektur zur Unterstützung der Anwendungen der
elektronischen Gesundheitskarte. Informatik-
Spektrum, 29 (5), pp. 341-348.
Drees, D., 2007: The Introduction of Health Telematics in
Germany. In: European Commission Directorate
General Information Society, Information Security
Solutions Europe/SECURE 2007 Conference. Poland,
Warsaw 25 27 September 2007. Vieweg: Wiesbaden.
gematik, Gesellschaft für Telematikanwendungen der
Gesundheitskarte mbH, 2008a. Spezifikation eHealth-
Kartenterminal. Version 2.8.0.
gematik, Gesellschaft für Telematikanwendungen der
Gesundheitskarte mbH, 2008b. Facharchitektur
Verordnungsdatenmanagement (VODM). Version
1.5.1.
gematik, Gesellschaft für Telematikanwendungen der
Gesundheitskarte mbH, 2008c. Übergreifendes
Sicherheitskonzept der Gesundheitstelematik. Version
2.3.0., Anhang B.
gematik, Gesellschaft für Telematikanwendungen der
Gesundheitskarte mbH, 2008d.
Konnektorspezifikation. Version 3.0.0.
Neuhaus, J., Deiters, W. & Wiedeler, M., 2006.
Mehrwertdienste im Umfeld der elektronischen
Gesundheitskarte. Informatik-Spektrum, 22 (5),
pp.332-340
SGB V, 2007. Sozialgesetzbuch. Fünftes Buch. DTV-
Beck.
Schweiger, A., Sunyaev, A., Leimeister, J.M., Krcmar, H.
2007. Information Systems and Healthcare XX:
Toward Seamless Healthcare with Software Agents.
In: Communications of the Association for
Information Systems (CAIS), Vol. 19 (2007) Nr.
Article 33, pp. 692-709.
Sunyaev, A. et al., 2009a. Analysis of the Applications of
the Electronic Health Card in Germany. In: WI 2009,
Proceedings of Wirtschaftsinformatik 2009, Austria,
Vienna 25-27 February 2009.
Sunyaev, A., Kaletsch, A., Mauro, C. & Krcmar, H.
2009b. Security Analysis of the German electronic
Health Card’s Peripheral Parts. ICEIS 2009 -
Proceedings of the 11th International Conference on
Enterprise Information Systems, Volume ISAS, pp.
19-26.
ATTACK SCENARIOS FOR POSSIBLE MISUSE OF PERIPHERAL PARTS IN THE GERMAN HEALTH
INFORMATION INFRASTRUCTURE
235