Pattern Co-Usage Map
This page shows how the FHIR implementation patterns commonly work together in real-world deployments.
Overview
Healthcare interoperability systems rarely use patterns in isolation. Instead, they combine multiple patterns to address complex, multi-faceted challenges.
Pattern Usage by Scenario
The following diagrams show how patterns work together in specific healthcare workflow scenarios:
Clinical Workflow Integration
Real-time coordination between EMR systems, imaging viewers, and mobile applications.
Research Data Export
Large-scale data extraction with de-identification and audit trails.
Legacy System Modernization
Gradual migration from legacy systems to modern FHIR-based architectures.
Alternative Views
Architectural Layers
How patterns fit into Application, Integration, Platform, and Foundation layers.
Complete Co-Usage Map
Comprehensive overview of all pattern relationships.
Common Pattern Combinations
1. Federated Clinical Access
Purpose: Enable secure, federated access to patient data across multiple healthcare organizations.
Pattern Combination:
- Broker - Provide a unified entry point for FHIR operations that route...
- Naming and Trading Service - Enable dynamic discovery and selection of FHIR endpoints bas...
- Security Strategy - Provide pluggable authentication and authorization strategie...
- Privacy Enforcement - Apply patient consent and data use restrictions through FHIR...
Key Interactions:
- Broker uses Naming/Trading for endpoint discovery
- SMART Strategy provides authentication context to Broker
- Privacy Enforcement applies consent rules through Broker
- All patterns leverage shared Audit & Provenance Chain
2. Population-level Research Export
Purpose: Extract large-scale, de-identified datasets for research and analytics.
Pattern Combination:
- Population Export Pipeline - Orchestrate large-scale data extraction using FHIR Bulk Data...
- Asynchronous Invocation - Handle long-running FHIR operations through asynchronous job...
- Security Strategy - Provide pluggable authentication and authorization strategie...
- De-Identification Adapter - Apply consistent de-identification transformations across FH...
Key Interactions:
- Population Export uses Async Invocation for job management
- Backend Strategy provides system scopes for bulk operations
- De-Identification Adapter transforms exported data
- Capability Facade validates $export support
3. Imaging-enabled EMR/EHR
Purpose: Integrate medical imaging capabilities into electronic medical record systems.
Pattern Combination:
- Imaging Bridge - Connect FHIR-based clinical systems with DICOM imaging syste...
- IID Facade - Provide simplified, URL-based launching of imaging viewers w...
- Event Observer - Enable real-time synchronization of clinical context across ...
Key Interactions:
- Imaging Bridge provides metadata and image access
- IID Facade enables simple viewer launching
- Event Observer synchronizes clinical context across applications
4. Legacy Modernization
Purpose: Gradually modernize legacy healthcare systems while preserving workflows.
Pattern Combination:
- Legacy Adapter - Transform legacy data formats (HL7v2, CDA, DICOM SR) to FHIR...
- Broker - Provide a unified entry point for FHIR operations that route...
- Security Strategy - Provide pluggable authentication and authorization strategie...
Key Interactions:
- Legacy Adapter exposes legacy systems as FHIR endpoints
- Broker provides unified access point for mixed environments
- Audit Chain tracks migration and modernization progress
Shared Services
Audit & Provenance Chain
- Used By: All pattern combinations
- Purpose: Comprehensive audit logging and data lineage tracking
- Standards: IHE ATNA/BALP, FHIR AuditEvent and Provenance
Consent / Security Labels Engine
- Used By: Federated Access, Research Export
- Purpose: Apply patient consent and data use restrictions
- Standards: FHIR Consent, Security Labels, Data Access Policies IG
Capability Facade
- Used By: Federated Access, Research Export, Imaging Integration
- Purpose: Simplified capability discovery and negotiation
- Standards: FHIR CapabilityStatement, SMART configuration
Terminology Service (Flyweight)
- Used By: All combinations (especially De-ID and Legacy Adapter)
- Purpose: Efficient terminology lookup and value set expansion
- Standards: FHIR Terminology Services, value sets, code systems
Implementation Sequence
Foundation
Start with Audit & Provenance Chain and Security Strategy
Core Integration
Implement Broker and Capability Facade
Specialized Functions
Add domain-specific patterns (Imaging, Research, etc.)
Advanced Features
Implement Event Observer and Legacy Adapter as needed
Pattern Synergies
The patterns in this collection are designed to work together. Start with a core pattern like Broker or Security Strategy, then add complementary patterns as needed.
Customization
These combinations are starting points. Adapt them based on your specific requirements, existing infrastructure, and organizational constraints.