A Document Digital Signature is needed when these infrastructural mechanisms are not sufficient. This is usually only critical cases of high value or concern. Some example use-cases:
- Attesting a document as true copy - to verify that the document being used is the same as the original document and has not been modified by error or intent. Also important to establish the signer and the reason for signature
- Attesting clinical information content - a physician may choose to review a document and apply a signature to attest the report is complete and correct.
- Attesting to a diagnostic report - a doctor may verify a diagnostic report and apply a signature across both the source data and the diagnostic report. This provides a proof that the original data has also not changed since the diagnosis was made.
- Co-Signatures and Counter-Signatures. This functionality allows for complex workflows that might need to have signatures in a specific order.
- Signing multiple documents. This functionality produces one signature that signs multiple documents.
The Digital Signature document is an XML document following the W3C XML Signature specification using a W3C profile for signatures (XadES). IHE further profiles this to add a Purpose Of Signature, and Timestamp. Thus the Digital Signature document includes the signer credentials (X.509 certificate), timestamp of signing, purpose of signature, and a manifest of all the documents that are being signed with their individual hash value.
Given that these Digital Signatures are potentially going to need to be validated 10-20 years later and thus need to be self contained and self describing. It is this reason that IHE has mandated that the Digital Signature include the reason why the signature was done. These "Purpose of Signature" values come from a vocabulary defined in ASTM E1762 as show here. This allows for simple author signatures, but also more complex relationships to the signature such as validation signature, witness signature, addendum signature, and timestamp signature.
The result looks a little like this. The original document is mostly unmodified except that it has an association type "Signed".
The Signature Document contains the Who, When, and Why; along with the list of items that are signed with their individual hash codes. The whole thing is signed to protect it over time. In the case where these documents are managed in XDS, they both are registered as independent documents with the specific associations. This same mechanism is used for XDM, XDR, and XCA. Where the transport is some other method, the profile does not define how the two documents are managed.
References
- Status: Trial Implementation
- IHE ITI Supplement – Document Digital Signature
- August 2009
- Standards Used
DSG - A profile of XML-Digital Signatures to provide long-term signature across a 'document'
- Can sign any document type. Not limited to XML type documents such as CDA
- Signature document is created that is an XML-Digital Signature blob
- Original document to be signed is signed by 'reference'.
- Encapsulation is not a bad thing, but it does make the original document harder to get at. Especially if that original document is not XML based
- Signature by reference allows the original document to continue to be accessed normally by applications that don't need to validate he signature. While having the signature present for those applications that do need it.
- The digital signature includes the Date/Time of the signature. Assuming trustable date/time
- The digital signature includes the certificate of the signer
- Note that signatures need to be valid for decades. Which brings up interesting certificate management issues not addressed.
- The digital signature includes the reason for the signature. Why was it signed? What does the signature mean?
- XDS Metadata shows that the signature document is in a 'signs' relationship to the original document
- This allows for finding the signature from a document, and finding the document from the signature
- Works for XDS, XDM, XDR, XCA
- Might work for other environments as well. The main thing that must happen is for there to be a way to dereference the document ID number found in the digital signature document to get to the document that is being signed.
- Might be future work to have an encapsulated flavor
- USA Regulation from FDA that explains Digital Signature from Electronic Signature - 21 CFR Part 11
- (a) The regulations in this part set forth the criteria under which the agency considers electronic records, electronic signatures, and handwritten signatures executed to electronic records to be trustworthy, reliable, and generally equivalent to paper records and handwritten signatures executed on paper.
- (b) This part applies to records in electronic form that are created, modified, maintained, archived, retrieved, or transmitted, under any records requirements set forth in agency regulations. This part also applies to electronic records submitted to the agency under requirements of the Federal Food, Drug, and Cosmetic Act and the Public Health Service Act, even if such records are not specifically identified in agency regulations. However, this part does not apply to paper records that are, or have been, transmitted by electronic means.
- USA (DEA) Regulation update for electronic prescribing of Schedule II drugs
- Clearly a high value use-case that should be able to justify the overhead of digital signatures infrastructure.
- See: Signing CDA Documents
Back links
This is part of a blog presentation of the IHE Privacy and Security Profiles Overview:
This is part of a blog presentation of the IHE Privacy and Security Profiles Overview:
- Introduction to IHE impact on Meaningful Use
- IHE - Privacy and Security Profiles - Introduction
- IHE - Privacy and Security Profiles - Consistent Time
- IHE - Privacy and Security Profiles - Audit Trail and Node Authentication
- IHE - Privacy and Security Profiles - Enterprise User Authentication
- IHE - Privacy and Security Profiles - Cross-Enterprise User Assertion
- This Page
- IHE - Privacy and Security Profiles - Basic Patient Privacy Consents
- IHE - Privacy and Security Profiles - Document Encryption
- IHE - Privacy and Security Profiles - Access Control
- IHE - Privacy and Security Profiles - Miscellaneous
- IHE - Privacy and Security Profiles - Conclusion
This comment has been removed by a blog administrator.
ReplyDelete