Presentation is loading. Please wait.

Presentation is loading. Please wait.

ELECTRONIC PRESCRIPTIONS Basia Korel Kendra Wadsworth.

Similar presentations


Presentation on theme: "ELECTRONIC PRESCRIPTIONS Basia Korel Kendra Wadsworth."— Presentation transcript:

1 ELECTRONIC PRESCRIPTIONS Basia Korel Kendra Wadsworth

2 MOTIVATION Astronomical number of medical errors and deaths Astronomical number of medical errors and deaths Up to 7,000 Americans die per year Up to 7,000 Americans die per year The financial costs run nearly $77 billion a year The financial costs run nearly $77 billion a year Prescription fraud is a growing problem in the United States. Prescription fraud is a growing problem in the United States.

3 A. Prescription altered to change the type of drug from Tylenol II to Tylenol IV B. Prescription altered to change the number of refills from one to four

4 CURRENT STATE-OF-ART UIFramework - Graphical user interface of prescribing e-Prescriptions project UIFramework - Graphical user interface of prescribing e-Prescriptions project TrustworthyRX - Secure transmission of the e- Prescriptions across a trustworthy framework project TrustworthyRX - Secure transmission of the e- Prescriptions across a trustworthy framework project

5 GOALS Integrate the user interface for writing prescriptions with the project that digitally signs and secures the transmission of the prescription. Integrate the user interface for writing prescriptions with the project that digitally signs and secures the transmission of the prescription. Add further functionality to the user interface Add further functionality to the user interface To incorporate fingerprint authentication to ensure the identity of the physician To incorporate fingerprint authentication to ensure the identity of the physician

6 WHY FINGERPRINTS??? Impossible to lend someone your hand Impossible to lend someone your hand More than 50 percent of all help desk calls are related to passwords either lost, forgotten, or otherwise useless More than 50 percent of all help desk calls are related to passwords either lost, forgotten, or otherwise useless Other authentication mechanisms require you to carry something Other authentication mechanisms require you to carry something Everyone is known to have a unique, immutable fingerprint Everyone is known to have a unique, immutable fingerprint

7 DigitalPersona U.are.U 4000 Reader

8 FINGERPRINT IDENTIFICATION: HOW IT WORKS A fingerprint is made of a series of ridges and furrows on the surface of the finger. A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutia points. The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutia points. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending.

9 HOW IT WORKS… Fingerprint scanner captures an image of the fingerprint (the pattern of ridges and furrows) Fingerprint scanner captures an image of the fingerprint (the pattern of ridges and furrows) Only a subset of features are extracted from the image based on spatial relationships Only a subset of features are extracted from the image based on spatial relationships Data containing subset of data points is stored in a template Data containing subset of data points is stored in a template

10 HOW IT WORKS… Our system assumes enrollment – the fingerprint enrollment template is stored in a secure database Our system assumes enrollment – the fingerprint enrollment template is stored in a secure database The verification template is captured in the running system and verified against the enrollment template The verification template is captured in the running system and verified against the enrollment template

11 ISSUES… Integration - All data fields must be consistent in database, prescription object in UI and prescription object in TrustworthyRX Integration - All data fields must be consistent in database, prescription object in UI and prescription object in TrustworthyRX Means to instantiate prescription object in TrustworthyRX with populated fields from UI. Means to instantiate prescription object in TrustworthyRX with populated fields from UI. Generate an XML file with these populated fields according to XML Schema definition. Generate an XML file with these populated fields according to XML Schema definition. Fingerprint authentication – assume physician enrollment Fingerprint authentication – assume physician enrollment Generate and store x.509 certificates from a trust CA for appropriate stakeholders to digital sign prescription object. Generate and store x.509 certificates from a trust CA for appropriate stakeholders to digital sign prescription object.

12 DIGITAL SIGNATURES Public key cryptography algorithm Public key cryptography algorithm Jane wants to send a secure message to John and John wants to verify it came from Jane Jane wants to send a secure message to John and John wants to verify it came from Jane 1. Jane’s message -> hash alg. -> Jane’s message digest 1. Jane’s message -> hash alg. -> Jane’s message digest 2. message digest -> Jane’s private key -> Jane’s signature 2. message digest -> Jane’s private key -> Jane’s signature 3. Jane -> Jane’s message and signature -> John 3. Jane -> Jane’s message and signature -> John 4. signature -> Jane’s public key -> hash alg. -> John’s computed message digest 4. signature -> Jane’s public key -> hash alg. -> John’s computed message digest 5. Jane’s message digest == John’s computed message digest 5. Jane’s message digest == John’s computed message digest

13 x.509 CERTIFICATES Uses a digital signature to bind a public key to an identity. Uses a digital signature to bind a public key to an identity. - authenticates user - assures that data - authenticates user - assures that data originated from the verified source originated from the verified source - data integrity - protects data from being altered - data integrity - protects data from being altered during transmission during transmission - confidentiality - protects a user’s identity. - confidentiality - protects a user’s identity. Our implement - Authenticode x.509 v.3 certificates - this certificate is signed with a private key that uniquely identifies the holder of the certificate. Our implement - Authenticode x.509 v.3 certificates - this certificate is signed with a private key that uniquely identifies the holder of the certificate.

14 E-PRESCRIPTIONS DEMO

15 A FEW PROBLEMS… Both projects needed to be redesigned for proper integration. Both projects needed to be redesigned for proper integration. Web Services – x.509 certificates Web Services – x.509 certificates Web Services - RSACryptoServiceProvider Web Services - RSACryptoServiceProvider

16 NOT ENOUGH TIME Web services Web services Timed session Timed session Replay attack Replay attack

17 FUTURE WORK WS-SecureConversation – ensure message level security by securing internal SOAP messages in the system. WS-SecureConversation – ensure message level security by securing internal SOAP messages in the system. Web services and SSL – secure end-user to web services connections and database to client connections. Web services and SSL – secure end-user to web services connections and database to client connections. Ensure ethical and lawful drugs/prescriptions are being issued. Ensure ethical and lawful drugs/prescriptions are being issued.

18 THANK YOUS Professor Weaver Professor Weaver Mentors: Shaun Hutton & Paul Bui Mentors: Shaun Hutton & Paul Bui Dr. Tom Powers Dr. Tom Powers NSF REU Group, Summer 2006 NSF REU Group, Summer 2006

19 REFERENCES Center for Problem-Oriented Policing, “The Problem of Prescription Fraud”, http://www.popcenter.org/Problems/problem- prescription-fraud.htm Center for Problem-Oriented Policing, “The Problem of Prescription Fraud”, http://www.popcenter.org/Problems/problem- prescription-fraud.htm Vogelsang, Jeff and Kristin Wang, “Trustworthy Electronic Prescriptions”, Project Documentation, April 2006. Vogelsang, Jeff and Kristin Wang, “Trustworthy Electronic Prescriptions”, Project Documentation, April 2006. Stuppy, John and Austin Kennedy, “Secure e- Prescriptions User Interface”, Project Summary & User Manual, Spring 2006. Stuppy, John and Austin Kennedy, “Secure e- Prescriptions User Interface”, Project Summary & User Manual, Spring 2006.


Download ppt "ELECTRONIC PRESCRIPTIONS Basia Korel Kendra Wadsworth."

Similar presentations


Ads by Google