DSTU2

This page is part of the FHIR Specification (v0.0.82: (v1.0.2: DSTU 1). 2). The current version which supercedes this version is 5.0.0 . For a full list of available versions, see the Directory of published versions . Page versions: R4 R3 R2

V3\IntegrityCheckAlgorithm\v3-IntegrityCheckAlgorithm.json V3-IntegrityCheckAlgorithm.json

Raw JSON ( canonical form )

? not found **** MISSING DEFINITIONS ****

{
  "resourceType": "ValueSet",
  "id": "v3-IntegrityCheckAlgorithm",
  "meta": {
    "lastUpdated": "2015-07-31T00:00:00.000+10:00",
    "profile": [
      "http://hl7.org/fhir/StructureDefinition/valueset-shareable-definition"
    ]
  },

  "text": {
    "status": "generated",
    "div": "<div><p>Release Date: 2014-08-07</p>\r\n<table class=\"grid\">\r\n <tr><td><b>Level</b></td><td><b>Code</b></td><td><b>Display</b></td><td><b>Definition</b></td></tr>\r\n <tr><td>1</td><td>SHA-1<a name=\"SHA-1\"> </a></td><td>secure hash algorithm - 1</td><td>\n                        This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard.  As of April 17, 1995.<br/>\r\n\n                     </td></tr>\r\n <tr><td>1</td><td>SHA-256<a name=\"SHA-256\"> </a></td><td>secure hash algorithm - 256</td><td>\n                        This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard.<br/>\r\n\n                     </td></tr>\r\n</table>\r\n</div>"

    "div": "<div>!-- Snipped for Brevity --></div>"

  },
  "identifier": "http://hl7.org/fhir/v3/vs/IntegrityCheckAlgorithm",

  "extension": [
    {
      "url": "http://hl7.org/fhir/StructureDefinition/valueset-oid",
      "valueUri": "urn:oid:2.16.840.1.113883.1.11.17385"
    }
  ],
  "url": "http://hl7.org/fhir/ValueSet/v3-IntegrityCheckAlgorithm",
  "version": "2015-07-31",

  "name": "v3 Code System IntegrityCheckAlgorithm",
  "status": "active",
  "experimental": false,

  "publisher": "HL7, Inc",
  "telecom": [

  "contact": [

    {
      "system": "url",
      "value": "http://hl7.org"

      "telecom": [
        {
          "system": "other",
          "value": "http://hl7.org"
        }
      ]

    }
  ],
  "description": "? not found",
  "status": "active",
  "date": "2014-08-07T00:00:00+10:00",
  "define": {

  "date": "2015-07-31",
  "description": "**** MISSING DEFINITIONS ****",
  "codeSystem": {
    "extension": [
      {
        "url": "http://hl7.org/fhir/StructureDefinition/valueset-oid",
        "valueUri": "urn:oid:2.16.840.1.113883.5.1010"
      }
    ],

    "system": "http://hl7.org/fhir/v3/IntegrityCheckAlgorithm",
    "caseSensitive": true,
    "concept": [
      {
        "code": "SHA-1",
        "abstract": false,

        "display": "secure hash algorithm - 1",
        "definition": "This algorithm is defined in FIPS PUB 180-1: Secure Hash Standard.  As of April 17, 1995."
      },
      {
        "code": "SHA-256",
        "abstract": false,

        "display": "secure hash algorithm - 256",
        "definition": "This algorithm is defined in FIPS PUB 180-2: Secure Hash Standard."
      }
    ]
  }
}

Usage note: every effort has been made to ensure that the examples are correct and useful, but they are not a normative part of the specification.