Connectathon 11 Snapshot

This page is part of the FHIR Specification (v1.2.0: STU 3 Draft). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R4 R3 R2

V3-IntegrityCheckAlgorithm.xml

Raw XML (canonical form)

**** MISSING DEFINITIONS ****

<ValueSet xmlns="http://hl7.org/fhir">
  <id value="v3-IntegrityCheckAlgorithm"/>
  <meta>
    <lastUpdated value="2015-11-30T00:00:00.000+11:00"/>
    <profile value="http://hl7.org/fhir/StructureDefinition/valueset-shareable-definition"/>
  </meta>
  <text>
    <status value="generated"/>
    <div xmlns="http://www.w3.org/1999/xhtml">
      <p>Release Date: 2015-11-30</p>

      <p>OID for code system: 2.16.840.1.113883.5.1010</p>

      <p>OID for value set: 2.16.840.1.113883.1.11.17385 (this is the value set that includes the
           entire code system)</p>

      <table class="grid">
 
        <tr>
          <td>
            <b>Level</b>
          </td>
          <td>
            <b>Code</b>
          </td>
          <td>
            <b>Display</b>
          </td>
          <td>
            <b>Definition</b>
          </td>
        </tr>
 
        <tr>
          <td>1</td>
          <td>SHA-1
            <a name="SHA-1"> </a>
          </td>
          <td>secure hash algorithm - 1</td>
          <td>
                        This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard.
                As of April 17, 1995.
            <br/>

                     
          </td>
        </tr>
 
        <tr>
          <td>1</td>
          <td>SHA-256
            <a name="SHA-256"> </a>
          </td>
          <td>secure hash algorithm - 256</td>
          <td>
                        This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard.
            <br/>

                     
          </td>
        </tr>

      </table>

    </div>
  </text>
  <extension url="http://hl7.org/fhir/StructureDefinition/valueset-oid">
    <valueUri value="urn:oid:2.16.840.1.113883.1.11.17385"/>
  </extension>
  <url value="http://hl7.org/fhir/ValueSet/v3-IntegrityCheckAlgorithm"/>
  <version value="2015-11-30"/>
  <name value="v3 Code System IntegrityCheckAlgorithm"/>
  <status value="active"/>
  <experimental value="false"/>
  <publisher value="HL7, Inc"/>
  <contact>
    <telecom>
      <system value="other"/>
      <value value="http://hl7.org"/>
    </telecom>
  </contact>
  <date value="2015-11-30"/>
  <description value="**** MISSING DEFINITIONS ****"/>
  <codeSystem>
    <extension url="http://hl7.org/fhir/StructureDefinition/valueset-oid">
      <valueUri value="urn:oid:2.16.840.1.113883.5.1010"/>
    </extension>
    <system value="http://hl7.org/fhir/v3/IntegrityCheckAlgorithm"/>
    <caseSensitive value="true"/>
    <concept>
      <code value="SHA-1"/>
      <abstract value="false"/>
      <display value="secure hash algorithm - 1"/>
      <definition value="This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard.  As of April 17, 1995."/>
    </concept>
    <concept>
      <code value="SHA-256"/>
      <abstract value="false"/>
      <display value="secure hash algorithm - 256"/>
      <definition value="This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard."/>
    </concept>
  </codeSystem>
</ValueSet>

Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.