Identity resolution
Encyclopedia
Identity resolution is an operational intelligence
Intelligence
Intelligence has been defined in different ways, including the abilities for abstract thought, understanding, communication, reasoning, learning, planning, emotional intelligence and problem solving....

 process, typically powered by an identity resolution engine or middleware
Middleware
Middleware is computer software that connects software components or people and their applications. The software consists of a set of services that allows multiple processes running on one or more machines to interact...

 stack
Stack
-Mathematics:* Stack , general category-theoretical concept to formalise "pull-back" operations in geometry and algebra* Algebraic stack, a generalisation of scheme and algebraic space in algebraic geometry; a specific type of the above-Computers:...

, whereby organizations can connect disparate data sources with a view
View
A view is what can be seen in a range of vision. View may also be used as a synonym of point of view in the first sense. View may also be used figuratively or with special significance—for example, to imply a scenic outlook or significant vantage point:...

 to understanding possible identity matches and non-obvious relationships across multiple data
Data
The term data refers to qualitative or quantitative attributes of a variable or set of variables. Data are typically the results of measurements and can be the basis of graphs, images, or observations of a set of variables. Data are often viewed as the lowest level of abstraction from which...

 silos. It analyzes all of the information
Information
Information in its most restricted technical sense is a message or collection of messages that consists of an ordered sequence of symbols, or it is the meaning that can be interpreted from such a message or collection of messages. Information can be recorded or transmitted. It can be recorded as...

 relating to individuals and/or entities from multiple sources of data, and then applies likelihood and probability scoring to determine which identities are a match and what, if any, non-obvious relationships exist between those identities.

Identity resolution engines are typically used to uncover risk
Risk
Risk is the potential that a chosen action or activity will lead to a loss . The notion implies that a choice having an influence on the outcome exists . Potential losses themselves may also be called "risks"...

, fraud
Fraud
In criminal law, a fraud is an intentional deception made for personal gain or to damage another individual; the related adjective is fraudulent. The specific legal definition varies by legal jurisdiction. Fraud is a crime, and also a civil law violation...

, and conflicts of interest, but are also useful tools for use within Customer Data Integration
Customer Data Integration
In data processing, customer data integration combines the technology, processes and services needed to set up and maintain an accurate, timely, complete and comprehensive representation of a customer across multiple channels, business-lines, and enterprises — typically from multiple sources of...

 (CDI) and Master Data Management
Master Data Management
In computing, master data management comprises a set of processes and tools that consistently defines and manages the non-transactional data entities of an organization...

 (MDM) requirements.

For example: Across different data silos - employee records, vendor data, watch lists, etc. - an organization may have several variations of an identity named Muammar al-Gaddafi
Muammar al-Gaddafi
Muammar Muhammad Abu Minyar Gaddafi or "September 1942" 20 October 2011), commonly known as Muammar Gaddafi or Colonel Gaddafi, was the official ruler of the Libyan Arab Republic from 1969 to 1977 and then the "Brother Leader" of the Libyan Arab Jamahiriya from 1977 to 2011.He seized power in a...

, which may or may not be the same individual. These entries may, in fact, appear as Moamar El Kadhaafi, Moammar Khadafy, or Mo'ammar Gadhafi within those data sources. By comparing similarities between underlying attributes such as address
Address (geography)
An address is a collection of information, presented in a mostly fixed format, used for describing the location of a building, apartment, or other structure or a plot of land, generally using political boundaries and street names as references, along with other identifiers such as house or...

, date of birth, or social security number
Social Security number
In the United States, a Social Security number is a nine-digit number issued to U.S. citizens, permanent residents, and temporary residents under section 205 of the Social Security Act, codified as . The number is issued to an individual by the Social Security Administration, an independent...

, the user can eliminate some possible matches and confirm others as very likely matches.

Identity resolution engines then apply rules, based on common sense logic, to identify hidden relationships across the data. In the example above, perhaps Muammar al-Quaddafi and Mo'ammar Gadhafi are not the same individual, but rather two distinct people who share common attributes such as address or phone number.

While entity resolution solutions include data matching technology, many data matching offerings do not fit the definition of identity (or entity) resolution. Here are four factors that distinguish entity resolution from data matching, according to Prof. John Talburt, director of the UALR Laboratory for Advanced Research in Entity Resolution and Information Quality:
  • Works with both structured and unstructured records, and it entails the process of extracting references when the sources are unstructured or semi-structured
  • Uses elaborate business rules and concept models to deal with missing, conflicting, and corrupted information
  • Utilizes non-matching, asserted linking (associate) information in addition to direct matching
  • Uncovers non-obvious relationships and association networks (i.e. who's associated with whom)


In contrast to data quality products, more powerful identity resolution engines also include a rules engine and workflow process, which apply business intelligence to the resolved identities and their relationships. These advanced technologies make automated decisions and impact business processes in real time, limiting the need for human intervention.

Typical uses for identity resolution engines include terrorist screening, insurance fraud detection, USA Patriot Act
USA PATRIOT Act
The USA PATRIOT Act is an Act of the U.S. Congress that was signed into law by President George W. Bush on October 26, 2001...

 compliance, Organized retail crime
Organized retail crime
Organized retail crime refers to professional shoplifting, cargo theft, retail crime rings and other organized crime occurring in retail environments. One person acting alone is not considered an example of organized retail crime. The FBI has estimated that the losses attributed to organized...

 ring detection and applicant screening.

See also

  • Background check
    Background check
    A background check or background investigation is the process of looking up and compiling criminal records, commercial records and financial records of an individual....

  • Infoglide Software
    Infoglide Software
    Infoglide Software Corporation provides identity resolution and entity analytics software and services for commercial and government markets.The company's products support various entity resolution and analysis solutions including airline passenger screening, insider trading discovery, banking...

  • Information silo
    Information silo
    An information silo is a management system incapable of reciprocal operation with other, related management systems. A bank's management system, for example, is considered a silo if it cannot exchange information with other related systems within its own organization, or with the management systems...

  • Middleware
    Middleware
    Middleware is computer software that connects software components or people and their applications. The software consists of a set of services that allows multiple processes running on one or more machines to interact...

  • Secure Flight
    Secure Flight
    Secure Flight is an airline passenger pre-screening program to be implemented starting in August 2009 by the Transportation Security Administration . Secure Flight will match passenger information against blacklists maintained by the federal government...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK