HL7 Terminology (THO)
5.4.0 - Continuous Process Integration (ci build)
HL7 Terminology (THO) - Local Development build (v5.4.0) built by the FHIR (HL7® FHIR® Standard) Build Tools. See the Directory of published versions
| Draft as of 2024-09-04 | Maturity Level: 1 |
{
"resourceType" : "CodeSystem",
"id" : "communication-security-mode",
"meta" : {
"lastUpdated" : "2020-04-09T21:10:28.568+00:00",
"profile" : [
🔗 "http://hl7.org/fhir/StructureDefinition/shareablecodesystem"
]
},
"text" : {
"status" : "generated",
"div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: CodeSystem communication-security-mode</b></p><a name=\"communication-security-mode\"> </a><a name=\"hccommunication-security-mode\"> </a><a name=\"communication-security-mode-en-US\"> </a><div style=\"display: inline-block; background-color: #d9e0e7; padding: 6px; margin: 4px; border: 1px solid #8da1b4; border-radius: 5px; line-height: 60%\"><p style=\"margin-bottom: 0px\">Last updated: 2020-04-09 21:10:28+0000</p><p style=\"margin-bottom: 0px\">Profile: <a href=\"http://hl7.org/fhir/R4/shareablecodesystem.html\">Shareable CodeSystem</a></p></div><p>This case-sensitive code system <code>http://terminology.hl7.org/CodeSystem/communication-security-mode</code> defines the following codes:</p><table class=\"codes\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td style=\"white-space:nowrap\">sign<a name=\"communication-security-mode-sign\"> </a></td><td>Sign</td><td>A signature-based security mode ensures data integrity by digitally signing information. This process verifies the author's identity and guarantees that the content has not been altered or corrupted since its signing, using a cryptographic hash.</td></tr><tr><td style=\"white-space:nowrap\">encrypt<a name=\"communication-security-mode-encrypt\"> </a></td><td>Encrypt</td><td>An encryption-based security mode is used to secure communications by encrypting data. It involves a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish and exchange a session key for these purposes.</td></tr><tr><td style=\"white-space:nowrap\">auth<a name=\"communication-security-mode-auth\"> </a></td><td>Authentication</td><td>An authentication security mode is used to verify and ensure the accuracy of an entity's claimed identity.</td></tr></table></div>"
},
"extension" : [
{
"url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-wg",
"valueCode" : "pa"
},
{
"url" : "http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm",
"valueInteger" : 1
}
],
"url" : "http://terminology.hl7.org/CodeSystem/communication-security-mode",
"version" : "1.0.0",
"name" : "Communication Security Mode",
"title" : "Communication Security Mode",
"status" : "draft",
"experimental" : false,
"date" : "2024-09-04T18:37:57+00:00",
"publisher" : "Health Level Seven International",
"contact" : [
{
"telecom" : [
{
"system" : "url",
"value" : "http://hl7.org"
},
{
"system" : "email",
"value" : "hq@HL7.org"
}
]
}
],
"description" : "This code system defines a set of codes that can be used to describe how a digital certificate is used. The sign code ensures data integrity by digitally signing information, verifying the author and confirming that the data has not been altered. The encrypt code protects confidentiality by encrypting data, ensuring that only authorized parties can access the information. The authentication code verifies the identity of entities involved in the communication, providing assurance that the claimed identity is accurate. Together, these codes form a comprehensive framework for secure and trustworthy data exchange.",
"copyright" : "This material derives from the HL7 Terminology (THO). THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license",
"caseSensitive" : true,
"valueSet" : "http://terminology.hl7.org/ValueSet/communication-security-mode",
"content" : "complete",
"concept" : [
{
"code" : "sign",
"display" : "Sign",
"definition" : "A signature-based security mode ensures data integrity by digitally signing information. This process verifies the author's identity and guarantees that the content has not been altered or corrupted since its signing, using a cryptographic hash."
},
{
"code" : "encrypt",
"display" : "Encrypt",
"definition" : "An encryption-based security mode is used to secure communications by encrypting data. It involves a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish and exchange a session key for these purposes."
},
{
"code" : "auth",
"display" : "Authentication",
"definition" : "An authentication security mode is used to verify and ensure the accuracy of an entity's claimed identity."
}
]
}