Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Table of Contents

Search

  1. Preface
  2. Working with Transformations
  3. Aggregator Transformation
  4. Classifier Transformation
  5. Cleanse transformation
  6. Comparison Transformation
  7. Custom Transformation
  8. Custom Transformation Functions
  9. Consolidation Transformation
  10. Data Masking Transformation
  11. Data Masking Examples
  12. Decision Transformation
  13. Dynamic Lookup Cache
  14. Expression Transformation
  15. External Procedure Transformation
  16. Filter Transformation
  17. HTTP Transformation
  18. Identity Resolution Transformation
  19. Java Transformation
  20. Java Transformation API Reference
  21. Java Expressions
  22. Java Transformation Example
  23. Joiner Transformation
  24. Key Generator Transformation
  25. Labeler Transformation
  26. Lookup Transformation
  27. Lookup Caches
  28. Match Transformation
  29. Match Transformations in Field Analysis
  30. Match Transformations in Identity Analysis
  31. Merge Transformation
  32. Normalizer Transformation
  33. Parse transformation
  34. Rank Transformation
  35. Router Transformation
  36. Rule Specification transformation
  37. Sequence Generator Transformation
  38. Sorter Transformation
  39. Source Qualifier Transformation
  40. SQL Transformation
  41. Using the SQL Transformation in a Mapping
  42. Stored Procedure Transformation
  43. Standardizer Transformation
  44. Transaction Control Transformation
  45. Union Transformation
  46. Unstructured Data Transformation
  47. Update Strategy Transformation
  48. Verifier transformation
  49. Weighted Average Transformation
  50. XML Transformations

Transformation Guide

Transformation Guide

Identity Match Algorithms

Identity Match Algorithms

The Match transformation includes predefined identity algorithms that compare the data values in the identity index. Select the algorithm that best represents the type of identity data in the data set.
The following table describes the algorithms and identifies the inputs that you select for each one:
Identity Algorithm
Description
Address
Identifies records that share an address.
The algorithm requires the following primary input:
  • Address
The algorithm does not require a secondary input.
Contact
Identifies records that share a contact at a single organization location.
The algorithm requires the following primary inputs:
  • Person_Name
  • Organization_Name
  • Address_Part1
The algorithm does not require a secondary input.
Corp Entity
Identifies records that share corporate identification data. Optionally, select this algorithm to analyze address and telephone data.
The algorithm requires the following primary input:
  • Organization_Name
The algorithm does not require a secondary input.
Division
Identifies records that share an office location within an organization.
The algorithm requires the following primary inputs:
  • Organization_Name
  • Address_Part1
The algorithm does not require a secondary input.
Family
Identifies individuals that belong to a family. Analyzes name, address, and telephone number data.
The algorithm requires the following primary input:
  • Person_Name
The algorithm requires one of the following secondary inputs:
  • Address_Part1
  • Telephone_Number
Fields
Identifies records that share data on ports that you select.
The algorithm does not specify any required input. Select the port or ports that might contain duplicate identity data.
Household
Identifies individuals that belong to a household. Analyzes name data and address data.
The algorithm requires the following primary inputs:
  • Person_Name
  • Address_Part1
Individual
Identifies duplicate individuals. Analyzes name, date of birth, and personal identification data such as Social Security numbers, account numbers, and vehicle identification numbers.
The algorithm requires the following primary input:
  • Person_Name
The algorithm requires one of the following secondary inputs:
  • Date
  • ID
Organization
Identifies records that share organization data.
The algorithm requires the following primary input:
  • Organization_Name
The algorithm does not require a secondary input.
Person Name
Identifies records that share information about individuals.
The algorithm requires the following primary input:
  • Person_Name
The algorithm does not require a secondary input.
Resident
Identifies duplicate individuals at an address. Optionally, configure this strategy to analyze personal identification data.
The algorithm requires the following primary input:
  • Person_Name
  • Address_Part1
The algorithm does not require a secondary input.
Wide Contact
Identifies records that share a contact at an organization.
The algorithm requires the following primary inputs:
  • Person_Name
  • Organization_Name
The algorithm does not require a secondary input.
Wide Household
Identifies individuals that belong the same household.
The algorithm requires the following primary input:
  • Address_Part1
The algorithm does not require a secondary input.

0 COMMENTS

We’d like to hear from you!