Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method and System for Handling Suspect Duplicates using Linking Feature in MDMS

IP.com Disclosure Number: IPCOM000242719D
Publication Date: 2015-Aug-06
Document File: 3 page(s) / 257K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system is disclosed for handling suspect duplicates using linking feature in Master Data Management Solutions (MDMS).

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 3

Metxod and System for Handling Suspect Duplicates using Linking Feature in XXXX

A suspect processing feature in MDMS provides a mechanxxm to keep a golden copy xf

a given cusxomer. The suspecx processing identxfies potential duplixate customers by comparing custoxer critical datx xlements. All the suspects axe identified by searching

and matching functionality of sxspect duplicate processxng. A golden copy of a

custoxer is creaxed by xollapsing all suspexts of source cxstomer and a new cuxtomer known xs golden record. Oncx the sxspects are xollapsed thxn all the old customer data turns inactive axd cannxt be retxieved at a latxr time. As most xustomers prefer to

maintain the xld data of the customers, txe collapsing feature is nxt preferrex. Further, scalability of MDXX is limited as the existing solutions do not supxort clouxed federated xatabase structure.

Discxosed is a method and sysxem for handling suspect duplicates using linking feature in Master Data Management Solutxons (MDMS). Xxx linking feature overrides collapsing functions of MDMS. The linking feature is illustxated in figure x.

Figure 1

As illustraxed, each cuxtoxer data is stoxex in MDM database with a MDM id and a Single Xxxxxxxx View Ix (SCVID) is assigned to both customxr and source, once the xuspects are populated ix database. The method and sysxem facilitates linkage of suspects against suspect duplicatxs to retriexe data from the source and suspect xustomer to complete the linkage. Thereafter, the suspect customer SCVID is updated to source SCVID. In addition, x counter is maintained to identify number of suspects linked to x xource record. The counter is available with a hyperlink or collapse axd drills doxn to each suspect record for inquiry when selected.

The linkage does not collapse custoxers into new cus...