Information Management IBM InfoSphere Master Data Management, Version 11.3

Suspected duplicate processing for party data

InfoSphere® MDM provides a number of different methods for maintaining the quality of your party data, and provides services that maintain a single and accurate record of each party across your enterprise.

The concept of suspected duplicate processing represents the broad category of activities related to identifying persons or organizations that are likely duplicates of each other. Each time a person's or an organization's data changes, there is a possibility that the entry in InfoSphere MDM for that person or organization is, in fact, a duplicate of another person or organization.

Maintaining high quality data is critical to all InfoSphere MDM solutions. To achieve this, it is very important that each enterprise considers how to orchestrate its people, processes, and technology to work together to manage data assets. The InfoSphere MDM suspected duplicate processing functionality can be a key piece of your larger data governance strategy.

Suspected duplicate processing is the process of searching for, matching, creating associations between and, when appropriate, merging data for existing duplicate party records in the system. Duplicate party records are known as suspect parties or suspected duplicates.

InfoSphere MDM suspected duplicate processing builds the single version of the truth for a particular party by taking suspected duplicate records provided by numerous source systems. This processed, accurate record is sometimes referred to as the golden master or golden record.

The SDP business flow for merging duplicate party records into a golden record
  1. Party data in source systems is profiled and analyzed.
  2. Party data is loaded into InfoSphere MDM and cleansed.
  3. Suspected duplicates are searched and matched.
  4. Suspected duplicates are linked. Golden records can be automatically created.
  5. Data stewards review suspected duplicates and create golden records.

Suspected duplicate processing can be a complex process, despite seeming straightforward on the surface. The complexity of the suspected duplicate processing process is driven by the fact that many organizations lack trusted information. Information is often incomplete, out of date, or inaccurate, so before you can determine how to find the duplicate party records in your enterprise, you need to figure out the topology of the data in the systems that will be contributing to your master data store. This can be done by profiling and analyzing the systems in order to better understand the nature of the data.

After suspected duplicate records have been identified, the suspect deduplication process involves two broad tasks:
If suspected duplicate processing identifies a suspected duplicate party, you may need to use the InfoSphere MDM Data Stewardship functionality to:


Last updated: 27 June 2014