This page is part of the FHIR Specification (v1.6.0: STU 3 Ballot 4). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R4 R3
**** MISSING DEFINITIONS ****
{ "resourceType": "CodeSystem", "id": "v3-IntegrityCheckAlgorithm", "meta": { "lastUpdated": "2016-03-23T00:00:00.000+11:00" }, "text": { "status": "generated", "div": "<div>!-- Snipped for Brevity --></div>" }, "url": "http://hl7.org/fhir/v3/IntegrityCheckAlgorithm", "identifier": { "system": "urn:ietf:rfc:3986", "value": "urn:oid:2.16.840.1.113883.5.1010" }, "version": "2016-03-23", "name": "v3 Code System IntegrityCheckAlgorithm", "status": "active", "experimental": false, "publisher": "HL7, Inc", "contact": [ { "telecom": [ { "system": "other", "value": "http://hl7.org" } ] } ], "date": "2016-03-23T00:00:00+11:00", "description": "**** MISSING DEFINITIONS ****", "caseSensitive": true, "valueSet": "http://hl7.org/fhir/ValueSet/v3-IntegrityCheckAlgorithm", "hierarchyMeaning": "subsumes", "content": "complete", "concept": [ { "code": "SHA-1", "display": "secure hash algorithm - 1", "definition": "This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard. As of April 17, 1995." }, { "code": "SHA-256", "display": "secure hash algorithm - 256", "definition": "This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard." } ] }
Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.