HL7 Terminology (THO)
5.4.0 - Continuous Process Integration (ci build) International flag

HL7 Terminology (THO) - Local Development build (v5.4.0) built by the FHIR (HL7® FHIR® Standard) Build Tools. See the Directory of published versions

: Communication Security Mode - XML Representation

Draft as of 2024-09-04 Maturity Level: 1

Raw xml | Download



<CodeSystem xmlns="http://hl7.org/fhir">
  <id value="communication-security-mode"/>
  <meta>
    <lastUpdated value="2020-04-09T21:10:28.568+00:00"/>
    <profile
             value="http://hl7.org/fhir/StructureDefinition/shareablecodesystem"/>
  </meta>
  <text>
    <status value="generated"/>
    <div xmlns="http://www.w3.org/1999/xhtml"><p class="res-header-id"><b>Generated Narrative: CodeSystem communication-security-mode</b></p><a name="communication-security-mode"> </a><a name="hccommunication-security-mode"> </a><a name="communication-security-mode-en-US"> </a><div style="display: inline-block; background-color: #d9e0e7; padding: 6px; margin: 4px; border: 1px solid #8da1b4; border-radius: 5px; line-height: 60%"><p style="margin-bottom: 0px">Last updated: 2020-04-09 21:10:28+0000</p><p style="margin-bottom: 0px">Profile: <a href="http://hl7.org/fhir/R4/shareablecodesystem.html">Shareable CodeSystem</a></p></div><p>This case-sensitive code system <code>http://terminology.hl7.org/CodeSystem/communication-security-mode</code> defines the following codes:</p><table class="codes"><tr><td style="white-space:nowrap"><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr><tr><td style="white-space:nowrap">sign<a name="communication-security-mode-sign"> </a></td><td>Sign</td><td>A signature-based security mode ensures data integrity by digitally signing information. This process verifies the author's identity and guarantees that the content has not been altered or corrupted since its signing, using a cryptographic hash.</td></tr><tr><td style="white-space:nowrap">encrypt<a name="communication-security-mode-encrypt"> </a></td><td>Encrypt</td><td>An encryption-based security mode is used to secure communications by encrypting data. It involves a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish and exchange a session key for these purposes.</td></tr><tr><td style="white-space:nowrap">auth<a name="communication-security-mode-auth"> </a></td><td>Authentication</td><td>An authentication security mode is used to verify and ensure the accuracy of an entity's claimed identity.</td></tr></table></div>
  </text>
  <extension
             url="http://hl7.org/fhir/StructureDefinition/structuredefinition-wg">
    <valueCode value="pa"/>
  </extension>
  <extension
             url="http://hl7.org/fhir/StructureDefinition/structuredefinition-fmm">
    <valueInteger value="1"/>
  </extension>
  <url
       value="http://terminology.hl7.org/CodeSystem/communication-security-mode"/>
  <version value="1.0.0"/>
  <name value="Communication Security Mode"/>
  <title value="Communication Security Mode"/>
  <status value="draft"/>
  <experimental value="false"/>
  <date value="2024-09-04T18:37:57+00:00"/>
  <publisher value="Health Level Seven International"/>
  <contact>
    <telecom>
      <system value="url"/>
      <value value="http://hl7.org"/>
    </telecom>
    <telecom>
      <system value="email"/>
      <value value="hq@HL7.org"/>
    </telecom>
  </contact>
  <description
               value="This code system defines a set of codes that can be used to describe how a digital certificate is used. The sign code ensures data integrity by digitally signing information, verifying the author and confirming that the data has not been altered. The encrypt code protects confidentiality by encrypting data, ensuring that only authorized parties can access the information. The authentication code verifies the identity of entities involved in the communication, providing assurance that the claimed identity is accurate. Together, these codes form a comprehensive framework for secure and trustworthy data exchange."/>
  <copyright
             value="This material derives from the HL7 Terminology (THO). THO is copyright ©1989+ Health Level Seven International and is made available under the CC0 designation. For more licensing information see: https://terminology.hl7.org/license"/>
  <caseSensitive value="true"/>
  <valueSet
            value="http://terminology.hl7.org/ValueSet/communication-security-mode"/>
  <content value="complete"/>
  <concept>
    <code value="sign"/>
    <display value="Sign"/>
    <definition
                value="A signature-based security mode ensures data integrity by digitally signing information. This process verifies the author's identity and guarantees that the content has not been altered or corrupted since its signing, using a cryptographic hash."/>
  </concept>
  <concept>
    <code value="encrypt"/>
    <display value="Encrypt"/>
    <definition
                value="An encryption-based security mode is used to secure communications by encrypting data. It involves a public key that can encrypt or decrypt electronic messages, files, documents, or data transmissions, or establish and exchange a session key for these purposes."/>
  </concept>
  <concept>
    <code value="auth"/>
    <display value="Authentication"/>
    <definition
                value="An authentication security mode is used to verify and ensure the accuracy of an entity's claimed identity."/>
  </concept>
</CodeSystem>