Extensions for Using Data Elements from FHIR STU3 in FHIR R5
0.1.0 - STU International flag

Extensions for Using Data Elements from FHIR STU3 in FHIR R5 - Downloaded Version null See the Directory of published versions

ValueSet: R3V3VerificationMethodForR5

Official URL: http://hl7.org/fhir/uv/xver/ValueSet/R3-v3-VerificationMethod-for-R5 Version: 0.1.0
Standards status: Trial-use Maturity Level: 0 Computable Name: R3V3VerificationMethodForR5

This cross-version ValueSet represents content from http://hl7.org/fhir/ValueSet/v3-VerificationMethod|2014-03-26 for use in FHIR R5.

This value set is part of the cross-version definitions generated to enable use of the value set http://hl7.org/fhir/ValueSet/v3-VerificationMethod|2014-03-26 as defined in FHIR STU3 in FHIR R5.

The source value set is bound to the following FHIR STU3 elements:

Note that all concepts are included in this cross-version definition because no concepts have compatible representations

Following are the generation technical comments:

FHIR ValueSet http://hl7.org/fhir/ValueSet/v3-VerificationMethod|2014-03-26, defined in FHIR STU3 does not have any mapping to FHIR R5

References

This value set is not used here; it may be used elsewhere (e.g. specifications and/or implementations that use this content)

Logical Definition (CLD)

  • Include these codes as defined in http://hl7.org/fhir/v3/ObservationMethod version 📍2016-11-11
    CodeDisplayDefinition
    VDOCdocument verificationVerification by means of document.


    Example: Fax, letter, attachment to e-mail.
    VREGregistry verificationverification by means of a response to an electronic query


    Example: query message to a Covered Party registry application or Coverage Administrator.
    VTOKENelectronic token verificationVerification by means of electronic token.


    Example: smartcard, magnetic swipe card, RFID device.
    VVOICEvoice-based verificationVerification by means of voice.


    Example: By speaking with or calling the Coverage Administrator or Covered Party
    _VerificationMethodVerificationMethodVerificationMethod

 

Expansion

This value set expansion contains 5 concepts.

SystemVersionCodeDisplayDefinitionJSONXML
http://hl7.org/fhir/v3/ObservationMethod2016-11-11  VDOCdocument verification

Verification by means of document.

                       Example: Fax, letter, attachment to e-mail.
http://hl7.org/fhir/v3/ObservationMethod2016-11-11  VREGregistry verification

verification by means of a response to an electronic query

                       Example: query message to a Covered Party registry application or Coverage Administrator.
http://hl7.org/fhir/v3/ObservationMethod2016-11-11  VTOKENelectronic token verification

Verification by means of electronic token.

                       Example: smartcard, magnetic swipe card, RFID device.
http://hl7.org/fhir/v3/ObservationMethod2016-11-11  VVOICEvoice-based verification

Verification by means of voice.

                       Example: By speaking with or calling the Coverage Administrator or Covered Party
http://hl7.org/fhir/v3/ObservationMethod2016-11-11  _VerificationMethodVerificationMethod

VerificationMethod


Explanation of the columns that may appear on this page:

Level A few code lists that FHIR defines are hierarchical - each code is assigned a level. In this scheme, some codes are under other codes, and imply that the code they are under also applies
System The source of the definition of the code (when the value set draws in codes defined elsewhere)
Code The code (used as the code in the resource instance)
Display The display (used in the display element of a Coding). If there is no display, implementers should not simply display the code, but map the concept into their application
Definition An explanation of the meaning of the concept
Comments Additional notes about how to use the code