HL7 Terminology (THO)
5.4.0 - Continuous Process Integration (ci build) International flag

HL7 Terminology (THO) - Local Development build (v5.4.0) built by the FHIR (HL7® FHIR® Standard) Build Tools. See the Directory of published versions

CodeSystem: Communication Security Mode

Official URL: http://terminology.hl7.org/CodeSystem/communication-security-mode Version: 1.0.0
Draft as of 2024-09-04 Maturity Level: 1 Responsible: Health Level Seven International Computable Name: Communication Security Mode

Copyright/Legal: This material derives from the HL7 Terminology (THO). THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license

This code system defines a set of codes that can be used to describe how a digital certificate is used. The sign code ensures data integrity by digitally signing information, verifying the author and confirming that the data has not been altered. The encrypt code protects confidentiality by encrypting data, ensuring that only authorized parties can access the information. The authentication code verifies the identity of entities involved in the communication, providing assurance that the claimed identity is accurate. Together, these codes form a comprehensive framework for secure and trustworthy data exchange.

This Code system is referenced in the content logical definition of the following value sets:

Generated Narrative: CodeSystem communication-security-mode

Last updated: 2020-04-09 21:10:28+0000

Profile: Shareable CodeSystem

This case-sensitive code system http://terminology.hl7.org/CodeSystem/communication-security-mode defines the following codes:

CodeDisplayDefinition
sign Sign A signature-based security mode ensures data integrity by digitally signing information. This process verifies the author's identity and guarantees that the content has not been altered or corrupted since its signing, using a cryptographic hash.
encrypt Encrypt An encryption-based security mode is used to secure communications by encrypting data. It involves a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish and exchange a session key for these purposes.
auth Authentication An authentication security mode is used to verify and ensure the accuracy of an entity's claimed identity.