
 
The patient’s real name and address can be restored 
by tracking his insurant’s id. With the id and the 
timestamp from the signature of the prescription it 
should be possible to receive the right insurance 
company’s information. Therefore, backtracking and 
reconstruction is always possible, however it will 
take some time and hence be costly. 
 
How can these Costs be Saved? 
Actually, there is no need to copy patient’s personal 
information, insurance data or dispensing person’s 
data into the prescription as it is already stored at the 
eHC. Therefore, the avoidance of creating duplicate 
information would not only save storage space, but 
also reduce risks. 
 
How to Deal with Prescriptions for Third Persons 
and Consumables for a Doctor's Surgery? 
In these special cases, a flag should be set which 
informs the pharmacist. Only then it should be 
allowed to add extra information about the receiving 
third persons. 
6 CONCLUSIONS 
In this paper, we presented different scenarios, 
which show that the functions of the German 
electronic health card’s peripheral parts can be 
abused. Three possible attacks were presented: 
- Automatic pairing of card readers and 
connector without administrative guidance 
- Misuse of encryption and signing  
- Creating inconsistent prescriptions 
Possible solutions were given and further 
questions discussed. The automatic pairing function 
would need to be deactivated at the connector, which 
will hardly cost anything. Therefore, this should be 
done immediately. Preventing misuse of 
functionality and creation of inconsistent 
prescription might prove to be more costly. The 
scenarios mentioned in this paper should be included 
in the overall security specification in order to make 
people aware of the possible risks. 
As the German electronic health card is currently 
on hold and redesigned in parts, security related 
parts will have to be reconsidered and newly 
checked once the moratorium ends. As presented in 
this paper, there is not only a need for proving 
information security, but the absence of possibilities 
to abuse functions must be checked, too. 
Furthermore, a security analysis concerning the 
central parts as well as the use and play of value-
added-applications has to be performed. 
REFERENCES 
Bales, S., 2003. Die Einführung der Telematik im 
Gesundheitswesen als Herausforderung für die 
Weiterentwicklung der Patientenrechte in 
Deutschland. [Talk] Bonn: gematik. Available at: 
http://www.dimdi.de/dynamic/de/ehealth/karte/downlo
adcenter/veroeffentlichungen/vortraege/bagh-bonn-
bal-031107.pdf [Accessed 9 September 2008]. 
Berg, W., 2004. Telemedizin und Datenschutz. 
Medizinrecht, 22 (8), pp. 411-414. 
BSI, Bundesamt für Sicherheit in der Informationstechnik, 
2004. Studie zu ISO-Normungsaktivitten ISO/BPM - 
Anforderungen an Information Security Management 
Systeme. 
Caumanns, J. et al., 2006. Die eGK-Lösungsarchitektur 
Architektur zur Unterstützung der Anwendungen der 
elektronischen Gesundheitskarte. Informatik-
Spektrum, 29 (5), pp. 341-348. 
Drees, D., 2007: The Introduction of Health Telematics in 
Germany. In: European Commission Directorate 
General Information Society, Information Security 
Solutions Europe/SECURE 2007 Conference. Poland, 
Warsaw 25 27 September 2007. Vieweg: Wiesbaden. 
gematik, Gesellschaft für Telematikanwendungen der 
Gesundheitskarte mbH, 2008a. Spezifikation eHealth-
Kartenterminal. Version 2.8.0.  
gematik, Gesellschaft für Telematikanwendungen der 
Gesundheitskarte mbH, 2008b. Facharchitektur 
Verordnungsdatenmanagement (VODM). Version 
1.5.1. 
gematik, Gesellschaft für Telematikanwendungen der 
Gesundheitskarte mbH, 2008c. Übergreifendes 
Sicherheitskonzept der Gesundheitstelematik. Version 
2.3.0., Anhang B. 
gematik, Gesellschaft für Telematikanwendungen der 
Gesundheitskarte mbH, 2008d. 
Konnektorspezifikation. Version 3.0.0.  
Neuhaus, J., Deiters, W. & Wiedeler, M., 2006. 
Mehrwertdienste im Umfeld der elektronischen 
Gesundheitskarte.  Informatik-Spektrum, 22 (5), 
pp.332-340 
SGB V, 2007. Sozialgesetzbuch. Fünftes Buch. DTV-
Beck. 
Schweiger, A., Sunyaev, A., Leimeister, J.M., Krcmar, H. 
2007. Information Systems and Healthcare XX: 
Toward Seamless Healthcare with Software Agents. 
In: Communications of the Association for 
Information Systems (CAIS), Vol. 19 (2007) Nr. 
Article 33, pp. 692-709. 
Sunyaev, A. et al., 2009a. Analysis of the Applications of 
the Electronic Health Card in Germany. In: WI 2009, 
Proceedings of Wirtschaftsinformatik 2009, Austria, 
Vienna 25-27 February 2009. 
Sunyaev, A., Kaletsch, A., Mauro, C. & Krcmar, H. 
2009b. Security Analysis of the German electronic 
Health Card’s Peripheral Parts. ICEIS 2009 - 
Proceedings of the 11th International Conference on 
Enterprise Information Systems, Volume ISAS, pp. 
19-26. 
ATTACK SCENARIOS FOR POSSIBLE MISUSE OF PERIPHERAL PARTS IN THE GERMAN HEALTH
INFORMATION INFRASTRUCTURE
235