Automated database blocking and record matching

ABSTRACT

An automated blocking technique is used as a first step to find approximate matches in a database. The technique builds a blocking set to be as liberal as possible in retrieving records that match on individual fields or sets of fields while avoiding selection criteria that are predicted to return more than the maximum number of records defining a particular special requirement. The ability to do blocking without extensive manual setup at low cost is highly advantageous especially when using a machine learning based second-stage matching algorithm.

CROSS-REFERENCES TO RELATED APPLICATIONS

[0001] This application claims the benefit of Provisional Application No. 60/371,412, filed Apr. 11, 2002, entitled “AUTOMATED DATABASE BLOCKING AND RECORD MATCHING”, which is incorporated herein by reference. This application is also related to commonly assigned copending patent application Ser. No. 10/325,043, filed Dec. 23, 2002 entitled “A PROBABALISTIC RECORD LINKAGE MODEL DERIVED FROM TRAINING DATA” which is a continuation of U.S. Pat. No. 6,523,019, the entire contents of which are hereby incorporated by reference herein.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

[0002] Not applicable.

FIELD

[0003] This application relates generally to record matching, and more particularly to blocking algorithms for selecting records for further processing. Still more particularly, this application relates to efficient algorithms for dynamically constructing or selecting queries that will return a maximum number of potentially matching records.

BACKGROUND AND SUMMARY

[0004] As the world becomes more and more computerized, so-called databases storing computerized information have become more significant and important. Most corporate, government and other entities make extensive use of database technology. For example, databases are used to keep track of your drivers license and car registration information, your medical records, your financial and banking information, your telephone number and address, and much other information.

[0005] Some databases are huge. Maintaining large databases can be difficult, time consuming and expensive. Duplicate records create an especially troublesome problem. Suppose for example that when a customer named “Joseph Smith” first starts doing business with an organization, his name is initially inputted into the computer database as “Joe Smith”. The next time he places an order, however, the sales clerk fails to notice or recognize that he is the same “Joe Smith” who is already in the database, and creates a new record under the name “Joseph Smith”. A still further transaction might result in a still further record under the name “J. Smith.” When the company sends out a mass mailing to all of its customers, Mr. Smith will receive three copies—one to “Joe Smith”, another addressed to “Joseph Smith”, and a third to “J. Smith.” Mr. Smith may be annoyed at receiving several duplicate copies of the mailing, and the business has wasted money by needlessly printing and mailing duplicate copies.

[0006] It is possible to program a computer to eliminate records that are exact duplicates. However, in the example above, the records are not exact duplicates, but instead differ in certain respects. It is difficult for the computer to automatically determine whether the records are indeed duplicates. For example, the record for “J. Smith” might correspond to Joe Smith, or it might correspond to Joe's teenage daughter Jane Smith living at the same address. Jane Smith will never get her copy of the mailing if the computer is programmed to simply delete all but one “J_Smith.” Data entry errors such as misspellings can cause even worse duplicate detection problems.

[0007] There are other situations in which different computer records need to be linked or matched up. For example, suppose that Mr. Smith has an automobile accident and files an insurance claim under his full name “Joseph Smith.” Suppose he later files a second claim for another accident under the name “J. R. Smith.” It would be helpful if a computer could automatically match up the two different claims records—helping to speed processing of the second claim, and also ensuring that Mr. Smith is not fraudulently attempting to get double recovery for the same accident.

[0008] Large databases create special problems in terms of efficient computing. It can take minutes, hours or sometimes even days to perform complex processes on large databases. It is generally desirable to reduce the amount of time required to perform such processing. This places a premium on more efficient database processing techniques.

[0009] One way to increase the efficiency of database and other record matching processing is to introduce a so-called “blocking” step. In the field of approximate record matching, a “blocking” step generally refers to a fast matching algorithm primarily used as the first step of a larger record matching system. The goal of a blocking step is generally to find all possible matches to an input query record. It is not ordinarily to aim for precision in determining which record is the correct match. Blocking thus aims for maximum “recall” or “sensitivity”, possibly at the expense of achieving high “precision” or “specificity”. In effect, blocking is a sort of “is it in the ballpark?” test that can be used to narrow down the number of records that need to be processed by a higher precision but more computationally intensive (or even manual) subsequent matching test.

[0010] Blocking algorithms have important applications in the field of approximate record matching. For example, they can be used to identify database records that might represent the same physical entity. These records can then be manually reviewed, or they could be automatically declared a match if the user does not require great accuracy. Another application (perhaps the most commonly used one) is to use a blocking algorithm as a first stage of a more accurate and computationally expensive record matching process. In this instance, in the second stage, one may use some matching technique to determine which record in the database is the best match to the “query record” being sought in the database. The second-stage matching algorithm then generally tests every record returned by the blocking algorithm against the query record to see if they match.

[0011] The initial blocking step is very useful because even with an extremely fast matching algorithm, when de-duplicating a database of n records where n is of any magnitude, it would generally be time-prohibitive and ineffective for the system to attempt to examine all (n * (n−1))/2 pairs of records in the database. Record matching systems often use a preliminary “blocking” step to reduce the number of pairs of records that the second-stage matching algorithm (SSMA) has to examine.

[0012] Traditional blocking methods are generally based on an ad hoc judgment of the usefulness of different fields in a matching decision. For instance, a healthcare site might use Medicaid and medical record number matches as blocking characteristics—meaning that any records matching on those two fields would be passed on to the second-stage matching algorithm. Also commonly used are matches on birthday and first name, birthday and last name, birthday and Soundex code of last name, etc.

[0013] This traditional approach can work reasonably well, but its ad hoc nature places a limitation on the portability of any system built around it. It also has a problem of generating too many false negative responses (i.e., records that should have been linked, but were not). The quality of the blocking routine is important to the ability of the system to minimize the number of false negatives since pairs that are not seen as possible matches in the blocking phase will be missed even if the second-stage matching algorithm's decision-making engine would have assigned them a high probability, or score, of match. At the same time, the system has to carefully manage tradeoffs between false negatives and run-time performance. If the blocking algorithm is too liberal in passing along hypothetical matches, system run-time may exceed the user's tolerance.

[0014] We provide an automated blocking technique that can be used for example as a first step to find approximate matches in a database. Exemplary illustrative non-limiting implementations of the technique build a blocking set to be as liberal as possible in efficiently retrieving records that match on individual fields or sets of fields while avoiding selection criteria that are predicted to return more than the maximum number of records defining a particular special requirement. The ability to do blocking without extensive manual setup at low cost is highly advantageous including but not limited to situations where a machine learning based or other second-stage matching algorithm is being used.

BRIEF DESCRIPTION OF THE DRAWINGS

[0015] These and other features and advantages provided in accordance with presently preferred exemplary embodiments of the invention will be better and more completely understood by referring to the following detailed description in connection with the drawings, of which:

[0016]FIG. 1 is a typical illustrative run-time architecture of a record matching system incorporating blocking;

[0017]FIG. 2 is an exemplary illustration of first name frequencies in a database; and

[0018]FIGS. 3 and 4 are flowcharts of an exemplary non-limiting automatic blocking algorithm.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

[0019]FIG. 1 shows an exemplary non-limiting overall typical run-time architecture of a record matching system incorporating blocking. As shown in FIG. 1, the process begins by searching records and performing a blocking step to limit the number of records that are returned by the search query. The blocking step returns many possible matches. A second stage matching algorithm is then applied to discover approximate or actual matches. Such a second stage matching algorithm may for example be as described in U.S. Pat. No. 6,523,019. Such an algorithm can match the probabilities of possible matches. An optional final human review step may be employed if high accuracy is required.

[0020] In one illustrative non-limiting implementation, given a search record, S, for which we are trying to find approximate matches in database D, blocking is the preferred first phase of an approximate record matching system. In this exemplary instances, blocking identifies a set of records, B, from D which are possible matches to S. The set of records B, is then passed on to the second-stage matching algorithm's core decision-making component, which outputs a probability for each record in B that it matches S. See FIG. 1.

[0021] Since the blocking algorithm performs the initial selection of candidate match records from D, any matching records that it fails to retrieve from D, cannot be identified as matches by the second-stage matching algorithm. A blocking algorithm thus forms a lower bound on the system's overall rate of missed matches. On the other hand, a blocking algorithm that retrieves a set of records B that is too large will slow the system because too many records have to be retrieved from the database and compared against S by the decision-making component. Furthermore, it may in many instances be advantageous to achieve these competing goals of speed and accuracy without requiring the user to do extensive experimentation and system configuration.

[0022] The automated blocking algorithm (“ABA”) of the preferred illustrative exemplary embodiment satisfies all three of these goals with a new approach to the problem of blocking. For a given speed requirement, which takes the form of a maximum number of records to be returned, the automated blocking algorithm uses a set of database (e.g., SQL or other conventional format) SELECT statements, which we call “blocking sets.” In one example non-limiting embodiment, each blocking set is built to be as liberal as possible in retrieving records that match S on individual fields or sets of fields while not containing SELECT statements that are predicted to return more than the maximum number of records.

[0023] One non-limiting example embodiment of an automated blocking algorithm is for a relational database accessed through SQL. Note, however, that this should not be construed as confining the work to relational databases accessed through SQL. The algorithms can also be used in conjunction with any relational or non-relational databases, including but not limited to object-oriented, object-relational, and network databases, as well as other data stores, including but not limited to flat files, XML files, and in-memory data stores. Furthermore, the algorithms can also be used to access data stores by means other than SQL, including but not limited to proprietary APIs for example.

[0024] One example non-limiting embodiment provides blocking sets as a union of SELECT statements. Note, however, that this should not be construed as confining the work to this specific form of queries. Any other form of queries that returns the same result may be used.

[0025] The ability to do blocking without extensive manual setup is useful to deploy a highly accurate system at a low implementation cost. Especially for example when the second-stage matching algorithm is based on a machine learning technique, the automated blocking algorithm's ability to automatically determine accurate blocking criteria on a query-by-query basis complements a machine learning system's ability to train itself from user-supplied data. In both cases, we are lessening the need for programming by technical/domain experts.

[0026] Note that nothing in this description should be construed as confining the work to the combination with a second-stage matching algorithm that uses machine learning. The technology described herein is also useful without a second-stage matching algorithm or with a second-stage matching algorithm that is not based on machine learning.

[0027] Detailed Exemplary Non-Limiting Implementation

[0028] Consider searching a database, D, for records that approximately match a search, S. S might consist of values that are hand-entered by the user, or it might be a record in another database, or a record from D itself for which we are seeking duplicate records. Because D may be too large to match S against all records, a blocking stage is used to select from D those records that potentially match S.

[0029] We have designed and developed an illustrative non-limiting Automatic Blocking Algorithm (ABA) that satisfies the following objectives:

[0030] Miss as few possible matches as practical (relying on the next stage to reject non-matches).

[0031] Use indices in D to perform quickly and avoid table scans.

[0032] Deploy easily against a new database.

[0033] Return some records.

[0034] Do not return too many records (where the value of ‘too many’ depends on performance characteristics, and typically lies between 100 and 1000) so that the entire approximate matching system runs quickly.

[0035] Conceptually, the exemplary automated blocking algorithm works as follows: the automated blocking algorithm maintains a table of counts of the common values in every field. On receiving a search, the automated blocking algorithm constructs or chooses a blocking query, Q, to retrieve entities similar to S. Q is structured as a union of SQL SELECT statements (q₁ UNION q₂ UNION . . . UNION q_(n)), where each q_(i) selects entities matching a particular set of fields in S. Each q_(i) is built so that the number of records it is expected to return lies below a specified threshold. This threshold is based on the frequencies with which the values in S appear in D (automated blocking algorithm treats these values as being independent). The set of q's is constructed so as to consider all possible subsets of the fields in S, while avoiding those useless _(q)'s which represent only a subset of the records returned by another q_(i). The implementation of automated blocking algorithm employs optimizations to keep the counts table small, and to avoid the possibly exponential size of Q.

[0036] The exemplary automated blocking algorithm misses few possible matches because it examines many sets of possible matching fields beginning with the least restrictive. It performs quickly because it always matches against indexed fields, and because it returns an appropriate number of possible matches enabling the retrieval from the database and the subsequent matching stage to run quickly. The exemplary automated blocking algorithm can be easily deployed since its configuration simply involves identifying matching fields and a threshold for the maximum number of records to be returned—all other parameters are obtained directly from the data. Instead of manually defining the set of matching fields, an optimal set can also be automatically computed based on the threshold for the maximum number of records to be returned or based on a specified maximum error rate.

[0037] Desirable Exemplary Non-Limiting Blocking Algorithm Characteristics

[0038] Minimize Missed Matches

[0039] Exemplary search errors are classified as shown in the following table. Error term Type Meaning False negative I An entity should have been matched, but was not- “missed match.” False positive II An entity was matched, but should not have been- “mistaken match.”

[0040] Since possible matches that blocking misses never reach the matching phase, they are completely missed. Thus the blocker determines the lower bound on the rate of missed matches and therefore minimizes its missed matches in one example embodiment.

[0041] Perform Well

[0042] Blocking should usually perform rapidly. Users of on-line systems care most about response time while users of batch systems care about throughput. Typical desired values (for a concurrent system) are listed in the following table. Characteristic Desirable performance range (low-high) Response time 1000-5 [ms] Throughput 5-1000 [transactions/sec]

[0043] While somewhat arbitrary, the desired values are derived from recent experience in the real world. For example, one example requirement is “the ability for the solution to execute transactions in real time and batch must not exceed 250 milliseconds per record processed.”

[0044] Easy Deployment

[0045] Blocking should be easy to deploy and require minimal configuration. Required programmer interventions include:

[0046] Connecting blocking to the database.

[0047] Identifying fields for matching against the search (i.e. build the configuration table). This can also be done automatically.

[0048] Selecting data matching functions to correct for errors in the identified fields. This can be done manually or automatically for a predefined set of functions.

[0049] Creating indices and views in the database (this can also be done automatically based on the schema)

[0050] Select the thresholds, or alternatively the maximum error rate.

[0051] Beyond the interventions listed above, all other intervention should generally be avoided although other interventions may be desirable in specific circumstances. To promote portability to any database system, the blocking should employ standard (e.g., SQL or other conventional) operations to the extent possible.

[0052] Data Characteristics

[0053] In this section we discuss exemplary non-limiting data characteristics that have influenced the design of our blocking algorithm. We have analyzed the characteristics of a typical production database and searches with an eye toward error rates, missing data, and distributions of values. Although different databases and approximate searches may present different characteristics, this algorithm has been tested on a database of low-quality medical data. Algorithms that work on this difficult data are likely to work for other cases as well.

[0054] Complexity

[0055] For our study, we considered a data set consisting of 2283 entity pairs that clerks reviewed and identified as matching. We analyzed which fields (or functions on fields) matched in matching pairs to produce the table shown below. Each column of the table under the heading “Match field sets” identifies a field (or derived field—see below) whose matching rate we measure. Each row analyzes a matching query consisting of the disjunction of all the participating match fields marked with ‘•’. For example, letting PERSON_A and PERSON_B denote the 2 member records of a matched pair, the 5^(th) row represents records that would be selected by

[0056] PERSON_A.LASTNAME=PERSON_B.LASTNAME

[0057] OR

[0058] PERSON_A.DOB=PERSON_B.DOB

[0059] OR

[0060] (PERSON_A.FIRSTNAME=PERSON_B.FIRSTNAME AND

[0061] SOUNDEX(PERSON_A.LASTNAME)=SOUNDEX(PERSON_B.LASTNAME))

[0062] where the function SOUNDEX ( ) evaluates to the Soundex of its argument. The last column, “Missed Match Fraction,” indicates the fraction of the 2283 matching pairs that do not match on the row's matching query. For example, the 11^(th) row indicates that all but 7.2% of the pairs match on DOB (date of birth), while the 3^(rd) row indicates that all but 0.48% match on SOUNDEX (FIRSTNAME) or DOB. These two rows provide the best one-field and two-field matches, respectively.

[0063] Because we aim for error rates below 1%, this analysis clearly shows that multiple sets of fields must be matched to sufficiently lower the missed matches. For example, a major investment bank may be quite unhappy with the 4% missed match error rate it experiences with a conventional system. The analysis also clearly demonstrates the trade-off between few missed matches and returning too many records. This can be seen by observing that while SOUNDEX (FIRSTNAME) appears in two of the most accurate rows, for common-sounding names SOUNDEX (FIRSTNAME) will return far too many records, and cannot be used. Our exemplary illustrative automated blocking algorithm follows strategies that incorporate both of these observations. Match field sets Firstname and Soundex Soundex Soundex Missed First Last of of of Match name name Firstname Lastname DOB Lastname Phone_no Patient_id Fraction 1 • • • • • 0.00% 2 • • • • 0.31% 3 • • 0.48% 4 • • 0.66% 5 • • • 0.68% 6 • • 0.83% 7 • • 1.05% 8 • • 3.1% 9 • • 3.2% 10 • • 3.9% 11 • 7.2% 12 • 10.1% 13 • 13.1% 14 • 16.4% 15 • 81.8% 16 • 95.9%

[0064] Size and Variability

[0065] We consider databases with many tables, and tables with many records and fields. For example, one example installation might have a database containing 13 tables with useful data, totaling 65 fields with information. The database might contain for example data on 2,331,299 children (some duplicated) with the following distinct records: Number of distinct Field Name values Addresses 3,625,481 Medical Ids 5,081,639 Patient names 2,557,744

[0066]FIG. 2 shows one example of the huge variability of the value-frequency of first names for children. The variability motivates our example non-limiting use of ‘data dependent’ blocking, which avoids matching on excessively common values. To control the number of records returned, an exemplary illustrative automated blocking algorithm may, for example, match entities in D on first_name when the search's first_name is “Tamar” or a less frequent name, but not when the search's FIRSTNAME is “Christina” or a more frequent name, like “Michael.”

[0067] An Exemplary Illustrative Non-Limiting Automated Blocking Algorithm

[0068] Notation

[0069] In this section we describe the structure of an exemplary non-limiting blocking algorithm's inputs and outputs and define some useful notation.

[0070] The query generated for search, S, is denoted as Q(S), or simply Q when S is clear from the context. In response to Q, the blocking phase returns the IDs of entities in the database, D, that potentially match S. We sometimes refer to this set of IDs as the “possible matches.”

[0071] We suppose that the search S specifies m fields

[0072] ((Field₁, Value₁), (Field₂, Value₂), . . . , (Field_(m), Value_(m)))

[0073] which means that the search is looking for entities in D for which Field₁, if present, is approximately equal to Value₁, and Field₂ is approximately equal to Value₂, etcetera. Presently, we assume D contains one table T, but later we show how automated blocking algorithm handles multiple tables. Likewise, we will show how to handle multiple values for a given field.

[0074] The field T.ID contains the IDs of entities in D.

[0075] To find possible matches, we structure Q as the union of a set of select statements, each of which returns a set of IDs, like this:

[0076] Q: q₁ UNION q2 UNION . . . UNION q_(n)

[0077] where each q_(i) has the form

[0078] q_(i): SELECT ID FROM T WHERE BS_(i)

[0079] The WHERE clause BS_(i) is called the blocking set. Each blocking set is structured as the conjunction of a set of fields in S, in this form

[0080] BS_(i): (Field_(a)=Value_(a)) AND (Field_(b)=Value_(b)) AND . . .

[0081] where the pairs Field_(a), Value_(a) are taken from S. The blocking set, BS_(i), requires that the fields a, b, . . . must equal the values specified for them in S. Different blocking sets need not use all the fields in S, rather each one represents a different combination of 1 to m of the fields in S. (Below in Section 12 we incorporate functions on fields in S, which accommodate the ‘approximately equal’ meaning.) For example, suppose the schema for D is T( ID, FIRST_NAME, LAST_NAME, DOB, CONTACTS_LAST_NAME, CONTACTS_MAIDEN_NAME) A search, S, might be the following: ((FIRST_NAME, ‘JOE’), (LAST_NAME, ‘SMITH’), (DOB, ‘OCT. 01, 1998’), (CONTACTS_FIRST_NAME, ‘MARY’), (CONTACTS_MAIDEN_NAME, ‘RICHARDSON’))

[0082] An example query Q generated from this search could be: SELECT ID FROM T WHERE DOB = ‘OCT. 01, 1998’ UNION SELECT ID FROM T WHERE FIRST_NAME = ‘JOE’ AND CONTACTS_MAIDEN_NAME = ‘RICHARDSON’ UNION SELECT ID FROM T WHERE LAST_NAME = ‘SMITH’ AND CONTACTS_MAIDEN_NAME = ‘RICHARDSON’ UNION SELECT ID FROM T WHERE CONTACT_FIRST_NAME = ‘MARY’ AND CONTACTS_MAIDEN_NAME = ‘RICHARDSON’ UNION SELECT ID FROM T WHERE FIRST_NAME = ‘JOE’ AND LAST_NAME = ‘SMITH’ AND CONTACT FIRST NAME = ‘MARY’

[0083] Given a search that specifies m fields there are 2^(m)−1 possible blocking sets. The goal of automated blocking algorithm is to choose fields for all the blocking sets BSi that best meet the requirements above.

[0084] Data Dependent Approach

[0085] Given a search S, automated blocking algorithm creates a new database query that depends on the fields, and the values, in S.

[0086] The goal is to choose the fields that comprise the blocking sets so that the expected number of records returned by a select on the blocking sets will not be too great. For example, if the size of T is 1 million, and the FIRST_NAME ‘JOE’ occurs 10,000 times (frequency 0.01) and the CONTACTS_MAIDEN_NAME ‘RICHARDSON’ occurs 1,000 times (frequency 0.001) then the query

[0087] SELECT * FROM T WHERE FIRST_NAME=‘JOE’ and CONTACTS_MAIDEN_NAME=‘RICHARDSON’

[0088] should return about 1,000,000×0.01×0.001=10 records. This estimate assumes that values of different fields are not related. If values are correlated, the number of records returned will exceed the expected estimate. If the values are anti-correlated then the number of records returned may be less than the expected estimate.

[0089] To achieve the stated goal, our exemplary non-limiting automated blocking algorithm implementation considers all possible blocking sets, in increasing size of the number of conditions per blocking set. One exemplary automated blocking algorithm considers fields in order of increasing counts, that is, increasing expected number of records returned by a SELECT. Thus, this exemplary automated blocking algorithm maintains a set of possible sets, and when it considers a new field, tries adding the field to each possible set. If the possible set with the field is sufficiently selective, then it becomes a blocking set.

[0090] For example, First_name=‘JOE’, occurring 10,000 times was not sufficiently selective, so it became a possible set. Adding CONTACTS_MAIDEN_NAME=‘RICHARDSON’ (occurring 1,000 times) made the expected number of records 10, which is sufficiently selective, so FIRST_NAME ‘JOE’ and CONTACTS_MAIDEN_NAME=‘RICHARDSON’ becomes a blocking set.

[0091] Preparation

[0092] Data that are computed in advance of executing the blocking algorithm include the variable NUMBER_RECORDS, which stores a count of the number of records in T, and a COUNTS table.

[0093] Conceptually, the COUNTS table stores, for each field in T, the number of records that have that value in the corresponding field. COUNTS ( FIELD_NAME, -- THE TEXT NAME OF THE FIELD VALUE, -- A VALUE FOUND IN FIELD_NAME -- (IGNORING TYPEING) COUNT INTEGER) -- THE NUMBER OF RECORDS IN T IN -- WHICH FIELD_NAME IS EQUAL TO VALUE

[0094] Recognizing that COUNTS may be expensive to maintain and store, we optimize it as described below.

[0095] Exemplary Non-Limiting Automated Blocking Algorithm Implementation

[0096] Here we describe an example non-limiting implementation in conjunction with FIG. 3. Alternate implementations, using a backtracking approach, for instance, are possible.

[0097] Given dearch S, this algorithm produces the blocking sets. 1. input S // the search, a list of (field,value) pairs (FIG. 3 block 202) 2. input Maximum_expected_records returned (FIG. 3 block 204) 3. for_each element in S append the field-value frequency, given by the value's COUNT/NUMBER_RECORDS (FIG. 3 block 206) 4. end_for 5. sort S by increasing frequency (FIG. 3 block 208) 6. output Generate_blocking_sets(S) a_set_of_sets_of_field_value_pairs Generate_blocking_sets(S) // Generate blocking sets for search S, S is a list of field,value, frequency) triplets (FIG. 3 block 210) 1. Possible_Subsets: a_set_of_sets_of_field_value_pairs // possible subsets of blocking sets 2. insert empty_set into Possible_Subsets 3. Blocking_sets: a_set_of_sets_of_field_value_pairs 4. for_each element in S 5. ConsiderNewField(element, Possible_Subsets, Blocking_(—) sets) 6. end_for 7. return Blocking_sets (FIG. 3 block 212)

[0098] The following describes an exemplary non-limiting implementation of the ConsiderNewField function in connection with FIG. 4.

[0099] ConsiderNewField((field,value,frequency); in/out: Possible_Subsets, Blocking_sets) // try to make blocking sets: consider adding ‘field’ to each set in Possible_Subsets, // is the result a blocking set? 1. if (frequency * table_size <= Maximum_expected_records_(—) returned) // the field by itself is already sufficiently selective, just add field to Blocking_sets a. insert {field} into Blocking sets 2. else a. for_each set_of_fields in copyOf(Possible_Subsets) b. get expected_count of set_of_fields c. expected_count = expected_count * frequency d. new_possible_blocking_set = insert field into set_(—) of_fields e. if (expected_count <= Maximum_expected_(—) records_returned) then insert new_possible_blocking_set into Blocking_sets f. else insert new_possible_blocking_set into Possible_Subsets g. end_if h. end_for 3. end_if

[0100] Complexity and Performance

[0101] Given n fields specified in S, the exemplary automated blocking algorithm considers all 2^(n) sets of fields, but prunes the space and considers sets in increasing size from 1. The exemplary automated blocking algorithm is worst-case exponential in the number n of fields in S and the largest number of blocking sets produced is $\begin{pmatrix} n \\ \left\lceil {n/2} \right\rceil \end{pmatrix}$

[0102] thanks to pruning optimizations. In the presence of derived fields and multiple values for the same field, the sum of the products of the number of values times usages for each field has to be substituted in the formula. Namely, (1) the exemplary automated blocking algorithm does not consider supersets of queries, which are already sufficiently selective, and, (2) the exemplary automated blocking algorithm knows the frequency of each field in the query, thus enabling us to compute the projected selectivity of each set of fields and determine when a set of fields is sufficiently selective.

[0103] As a practical matter, because the expected count of a blocking set declines multiplicatively with the addition of each field, the typical blocking set contains few fields. In a test of the exemplary automated blocking algorithm on a large database, we found that the maximum number of fields in any given SELECT was 2 and the maximum number of blocking sets in a query was 35 with 12 configured blocking fields and up to 4 values per field.

[0104] Other Exemplary Issues

[0105] Multiple Tables

[0106] To simplify the discussion, we have proceeded to this point as if the database D contained only one table. In practice D usually may contain multiple tables. This is the true, for example, when D stores multiple values for an individual field (a practice called ‘stacking’) in which case a separate table is employed to store the multiple values. The exemplary automated blocking algorithm handles multiple tables as follows:

[0107] Tables that do not store fields matching those in S are ignored.

[0108] All fields are specified by the form TABLE_NAME. FIELD_NAME.

[0109] Tables that store the entity's unique identifier (with the same semantics as the field T.ID mentioned in Section 6) are queried directly.

[0110] Tables that do not store the entity's unique identifier are joined with tables that do. The joins are implemented in views. The system installer specifies the views or they can be automatically generated from the schema.

[0111] The preparation obtains the number of records in each table and view that blocking uses. This value replaces NUMBER_RECORDS in the algorithm.

[0112] The COUNTS table stores a TABLE_NAME field identifying the table or view containing the field.

[0113] The expected number of records returned is computed as follows. Let MID be a unique id for all records in the non-stacked main table. Let IMID be the number of distinct records in the main table for the queried entity. Let |ID(T)| be the number of distinct MIDs for which there exists one or more associated entries in table T. Let c_(f)(v) be the number of distinct MIDs that have an associated row with value v in column f. From table Ti we have x_(i) fields. A blocking set that requires all fields fi_(k) of table Ti to have values vi_(k) is expected to return the following number of records: $E = \frac{{c_{f\quad 1_{1}}\left( {v\quad 1_{1}} \right)}*\ldots*{c_{f\quad 1_{x_{1}}}\left( {v\quad 1_{x_{1}}} \right)}*\ldots*{c_{{fn}_{1}}\left( {v\quad n_{1}} \right)}*\ldots*{c_{f\quad n_{x_{n}}}\left( {v\quad n_{x_{n}}} \right)}}{{{MID}}^{n - 1}*{\prod\limits_{\quad}^{\quad}\quad {{{ID}({Ti})}}^{x_{i} - 1}}}$

[0114] In the presence of stacked data and multiple values from the same stacked table or stacked tables that are in an ancestor-descendant relationship, an additional decision has to be made. Consider the case where we search for FIRST_NAME=‘JIM’ and LAST_NAME=‘SMITH’. and where the database contains a person with stacked names JIM SMYTHE and JAMES SMITH. If this record should be returned by blocking, we can write the query as

[0115] SELECT ID FROM NAMES A, NAMES B

[0116] WHERE A.FIRST_NAME=‘JIM’ AND B.LAST_NAME=‘SMITH’ AND A.ID=B.ID

[0117] rather than

[0118] SELECT ID FROM NAMES WHERE FIRST_NAME=‘JIM’ AND LAST NAME=‘SMITH’

[0119] The choice between the two options is one between higher accuracy and higher speed. Which option is chosen may depend upon the characteristics of the data. For example, in the case of names the first approach is typically better suited. On the other hand, if the two fields were street name and street number and stacked addresses were (mainly) used to store past addresses rather than spelling variations, the second option may be preferred. Since both approaches are useful in certain cases, we can allow the user to select in the configuration.

[0120] In the first approach, the two instances of the names table are to be considered as different tables for the formulas above.

[0121] A similar choice can be made for the source record if it contains stacked data. For example, if the source record has stacked names JIM SMYTHE and JAMES SMITH, we can allow or disallow the generation of blocking sets containing the first name from one stacked node and the last name from the other. Again, both options are useful depending upon the characteristics of the data and we let the user select in the configuration.

[0122] Derived Fields

[0123] Blocking finds approximate matches to the search because (1) it matches on only some of the fields in the search, and (2) it matches on error-correction fields, which are stored in the database. For example, if the database stores the Soundex phonetic transformation of LAST_NAME then blocking may try to match a Soundex of LAST_NAME in the search with Soundex (LAST_NAME) in the database. Thus, blocking generates derived fields from the search and matches them against values in the database. Derived values may be stored in the database rather than recomputed for every query for performance reasons.

[0124] In general, derived fields take two forms:

[0125] Error-tolerant: A field that tolerates errors in a stored field as in the Soundex example above.

[0126] Moved: A field that finds data that has been moved and stored in the wrong field. For example, blocking would seek a match between FIRST_NAME in the search and LAST_NAME in the database.

[0127] These derived fields can also be composed, that is, a moved, error-tolerant field can be matched. For example, blocking might retrieve records in which SOUNDEX_LAST_NAME equals Soundex(search.FIRST_NAME).

[0128] There are two situations where error toleration functions are employed—when data is entered into the database, and when a search is executed. On data entry, the error-tolerated values of certain fields (designated by configuration information) are computed and stored in error toleration fields. Some databases, such as Oracle 8i, can create an index on a function on a field, removing the need to store the result of the error toleration function in a field. For example, the configuration might indicate that whenever the field PHONE is inserted or updated, the value of the function hash(PHONE) should be stored in the field HASH_PHONE as follows: Error correction Source field function Error tolerant field LAST_NAME Soundex SOUNDEX_LAST_NAME PHONE Hash HASH_PHONE

[0129] In response to a search, a configuration table that indicates which derived fields should be considered for blocking controls the use of derived fields. Considering the number of fields specified in a search, the number of error correction functions, and the number of field moves, the range of possible derived fields could be huge. The configuration table selects a modest set of derived fields that are likely to correct actual errors in searches and the database. The system installer experiments with different configurations to select a good one, striking a balance between the desired accuracy (which requires more derived fields) and the need for speed (which requires fewer).

[0130] Blocking incorporates derived fields by prefacing the algorithm described in Section 2 with code that adds derived fields to S:

[0131] Add_derived_fields_to_S: 1. read search S 2. for_each field, value in S 3. if (derived_field_configuration_table derives a moved or error- corrected field from field) then 4. add the moved or error-corrected field to S 5. end if 6. end_for

[0132] The resulting S is used for blocking.

[0133] In the presence of moved fields, we can choose to allow the same value to be used for multiple fields or not. For example, if the search's first name is JOHN and blocking is configured to use the search's first name also on the last name field in the database, we can decide whether or not to allow the following blocking set:

[0134] SELECT ID FROM T WHERE

[0135] FIRST_NAME=‘JOHN’ AND LAST_NAME=‘JOHN’

[0136] As a variation, we can allow the above only if the search specified JOHN for both the first and last name.

[0137] If the same value is specified multiple times for the same field or if the same value is specified for field A and B and blocking is configured to use the search's value of A on B, the exemplary automated blocking algorithm avoids creating duplicate blocking sets.

[0138] Dependent Fields

[0139] Some field combinations do not make sense in a blocking set because the value in some fields depend on the value in other fields. For example, adding the condition FIRST_NAME=‘JOHN’ to the condition SOUNDEX_FIRST_NAME=SOUNDEX(‘JOHN’)_is unnecessary because every record that satisfies the second condition must satisfy the first condition. Given the variety of derived field functions, many dependencies between blocking fields may arise. In order to avoid adding unnecessary conditions that would needlessly slow the execution of the blocking query, the blocking algorithm tracks the dependencies between fields.

[0140] The exemplary automated blocking algorithm implementation does not create blocking sets that independent of the data in the database return a subset of the records of another blocking set. E.g., if we have a blocking set SOUNDEX_FIRST_NAME=SOUNDEX (‘JOHN’) no blocking set containing FIRST NAME=‘JOHN’ would be created.

[0141] Also, if multiple values have the same derived value, e.g., SOUNDEX (‘JOHN’)=SOUNDEX (‘JON’), the exemplary automated blocking algorithm does not create redundant blocking sets if both values are passed by the search.

[0142] Another related complication arises when a search contains a stacked field. For example, a search could be

[0143] ((FIRST_NAME, ‘JOE’), (FIRST_NAME, ‘JOEY’),

[0144] (LAST_NAME, ‘SMITH’), (DOB, ‘Oct. 01, 1998’))

[0145] In such cases it does not make sense to combine two where—clauses involving FIRST_NAME in a blocking query, because no record could match both. Thus, a blocking set clause, which contained

[0146] FIRST_NAME=‘JOE’ AND FIRST_NAME=‘JOEY’

[0147] would always return no records. The blocking algorithm avoids creating such queries.

[0148] Exemplary Illustrative Automated Blocking Algorithm Accuracy

[0149] We tested the missed match accuracy of an illustrative implementation of automated blocking algorithm on a training set consisting of 2283 matched record pairs. For each pair we used some values from the base record to form a search S, and then evaluated whether automated blocking algorithm found the matching record in the immunization database. The table below shows that only 2.4% of matches are missed when the search looks for 5 common fields, and that the error drops to 0.92% when 4 derived fields are added to the search. This is excellent performance for this particular test. Values from base record in Missed search Derived fields matches Firstname, Lastname, DOB, None 2.4% Patient_ID, Phone_number Firstname, Lastname, DOB, Soundex of Firstname, Soundex 0.92% Patient_ID, Phone_number of Lastname, Firstname movedto Lastname, Lastname movedto Firstname

[0150] Automatic Selection of Blocking Fields

[0151] Rather than selecting the potential blocking fields manually, the set of optimal blocking fields can be computed automatically for a given speed or accuracy requirement. This auxiliary algorithm works as follows.

[0152] 1) Select all fields as blocking fields, or have the user define a large set containing all potentially useful fields.

[0153] 2) Perform deduplication or linking using this large set of fields as the potential blocking fields in the automated blocking algorithm. The second-stage matching algorithm decides which of the records returned by blocking are matches or possible matches.

[0154] 3) Using the output of step 2, find an optimal or near-optimal subset of the original large set of blocking fields given specified speed or accuracy requirements.

[0155] In Step 3, optimal for a specified speed requirement means the set of fields that creates the lowest number of false negatives while satisfying the speed requirement. If, on the other hand, accuracy is specified, then optimal means the set of fields that yields the highest speed while satisfying the accuracy requirement. Since Step 3 can be performed using compact data structures, the whole step can be performed in memory even for large data sets, which makes an exhaustive search possible.

[0156] In further detail, an exemplary implementation of automatic blocking field selection is:

[0157] 1. Select all fields as the set F of blocking fields for the automated blocking algorithm.

[0158] 2. Perform deduplication on the target database D (or a subset of D) using F

[0159] 2.1. For each deduplication search record, S, generated from D, run the automated blocking algorithm on S. Score the returned records using the second-stage matching algorithm and retain all records which the second-stage matching algorithm scores as a match or possible match. Record in a compact data structure which blocking fields match S on each returned record.

[0160] 3. Find an optimal or near-optimal subset of F. Set F′=F.

[0161] 3.1. For each search record S

[0162] 3.1.1. For each field f in F′

[0163] 3.1.1.1. Use the automated blocking algorithm to compute the query, Q, that would be generated if the set of blocking fields were {F′−f}

[0164] 3.1.1.2. Using the compact data structure, rapidly compute the number of records, n, that would not be retrieved by Q.

[0165] 3.1.1.3. Add n to the running total of the number of records, c_(f) lost by omitting f from F′.

[0166] 3.2. Remove the field f from F′ for which c_(f) is the lowest. Remove the records from the compact data structure that were determined to be lost by the omission of f in step Error! Reference source not found.

[0167] 3.3. Check whether a solution has been found already

[0168] 3.3.1. If speed has been specified, check whether F′ satisfies the speed requirement. If so, stop and use F′ as the result. Otherwise recurse to step 3.1.

[0169]3.3.2. If accuracy has been specified, check whether F′ satisfies the accuracy requirement. If so, recurse to step 3.1. Otherwise, use F′+f (from Error! Reference source not found.) as the result.

[0170] A dual algorithm starts from the empty set of fields F′ and adds one field f from F at the time to F′. These greedy algorithms are fast, but are not guaranteed to find the optimal solution in all cases. Other slower algorithms, including exhaustive search, are guaranteed to give the optimal solution.

[0171] This approach also works for derived fields. If in Step 1, the user defines the original set of non-derived fields, nothing additional has to be done. If, on the other hand, the set is automatically determined, we add all the moved fields between fields of the same type and all error-tolerant fields for a given set of functions. The latter typically includes Soundex and functions that split a date into year, month, and day.

[0172] Optimizations

[0173] Database Indices

[0174] The database is configured to index all fields that are configured as possible blocking fields. Recognizing the cost of maintaining numerous, possibly unused, indices, each installation monitors actual blocking queries and turns off indexing on those fields that are not used in production blocking queries.

[0175] COUNTS Table

[0176] In the absence of optimization, the COUNTS table would store a row for every distinct value in the database. Fortunately, the exemplary automated blocking algorithm does not need to record the count of every value of every field—it only needs to store the counts of frequent field values. Hence, we define a threshold for the table such that the exemplary automated blocking algorithm stores the counts for those values that occur more frequently than threshold. If the exemplary automated blocking algorithm attempts to access the count for a field-value for which the count is below the threshold (and therefore not entered in COUNTS table), the field's threshold value is used. This overestimates the number of records returned by matching on this value, which ensures that the resulting blocking sets will not return too many records.

[0177] Setting the counts threshold equal to the Maximum_expected_records_returned value optimizes the COUNTS table. This has the effect of forcing fields with counts below the threshold to always be used as a single-field SELECT in the blocking algorithm. In other words, such fields would not be included in any multi-field SELECT statements. This reduces the COUNTS table size considerably. For example, for the immunization database, on the basis of performance considerations we set Maximum_expected_records_returned threshold to 100.

[0178] The table below shows the dramatic decrease in the COUNTS table size for 5 fields and 2 derived fields in the immunization database. The COUNTS table is updated periodically. Number of Percentage different reduction values in COUNTS Number of with table Field different values COUNT >100 size Firstname 296282 2291 99.2 Lastname  15012 2731 81.8 DOB  3167 2557 19.2 Patient_ID 3616814   18 99.9 Phone_Number 515873  28 99.9 SOUNDEX(Firstname)  5823 1548 73.4 SOUNDEX(Lastname)  6125 2484 59.4 Total 4459096  11657  99.7

[0179] Compiled SQL

[0180] As a variation, all or just the most common field combinations (blocking sets without values) and even combinations thereof can be created from the list of blocking fields and precompiled. Precompiled SQL is often significantly faster than dynamic SQL.

[0181] Factorization of Queries

[0182] If a query produces two or more blocking sets with identical conjuncts, e.g., FIRST_NAME=‘JOE’ as in the example of Section 6, we can factor out these conjuncts. In this example, we could combine the second and fifth blocking set to:

[0183] SELECT ID FROM T WHERE

[0184] FIRST_NAME=‘JOE’ AND

[0185] ((CONTACTS_MAIDEN_NAME=‘RICHARDSON’) OR

[0186] (LAST_NAME=‘SMITH’ AND CONTACT_FIRST_NAME=‘MARY’))

[0187] In most cases it may be best to leave factorization of queries and similar optimizations to the DBMS's optimizer.

[0188] Combination of Values

[0189] If the query contains multiple values for a field, e.g., first name John or Jim, we can use set membership (SQL IN). E.g., we can write

[0190] SELECT ID FROM T WHERE FIRST_NAME IN (‘JOHN’, ‘JIM’)

[0191] instead of

[0192] SELECT ID FROM T WHERE FIRST_NAME=‘JOHN’

[0193] UNION SELECT ID FROM T WHERE FIRST_NAME=‘JIM’

[0194] This also works if the condition is part of a more complex blocking set. Furthermore, the simplification is possible if some of the values are swapped values, e.g., we query for first name John and last name Smith and have blocking configured to use the last name of the query against the first name of the database.

[0195] The approach may not work if the different values have different counts. This optimization is especially useful if the blocking set contains another, less frequent field of the same table so that only the index on that field is used.

[0196] In most cases it may be best to leave combination of values and similar optimizations to the DBMS's optimizer.

[0197] Combined Return Limit

[0198] We specify the maximum number of records that each blocking set may return. The number of records returned from blocking may be considerably higher, especially if many blocking sets are built. We can limit the expected maximum of records returned by all blocking sets together by adjusting the per blocking set threshold based on the number of blocking sets produced.

[0199] Limitation of the Number and Size of Blocking Sets

[0200] In certain situations, overall performance may be higher if more records are returned to second-stage matching algorithm than if a very many blocking queries must be executed. For this purpose, an upper limit on the number of blocking sets and/or the number of fields per blocking set may be set in the automated blocking algorithm. The automated blocking algorithm may then increase the limit of records returned by each blocking set in order to build fewer, less selective blocking sets.

[0201] Validity

[0202] Fields can be excluded from being used for blocking if they do not satisfy a specified validity predicate. For example, we might not use the first name field for blocking if its value is ‘UNKNOWN’ or blank. Excluding fields that are unlikely to return actual matches reduces the number of blocking sets and records returned to improve performance.

[0203] Possibly Undesirable Combinations

[0204] It may not make sense in some applications to combine certain fields into a single blocking field. For example, it may be undesirable to create blocking sets containing conditions on both zip code and city name. The exemplary automated blocking algorithm allows the user to declare illegal combinations. The automated blocking algorithm will not create any blocking sets that contain such combinations as subsets.

[0205] Exemplary Correlation Factor

[0206] As a special case, an undesirable combination can be marked as exact meaning that the automated blocking algorithm may not create a blocking set containing exactly these fields, but may contain a superset thereof.

[0207] The estimation formula above is based on a statistical independence assumption. For certain combinations of fields, e.g., zip code and city name, this assumption does not hold. In this case, the automated blocking algorithm allows a correlation factor to be declared for groups of fields. This factor can be used in the formula if desired.

[0208] Eliminating the Independence Assumption

[0209] The exemplary algorithm does not depend on an assumption of statistical independence among the different fields composing the search. On the contrary, making use of an advanced selectivity estimation technique such as those found in (Getoor, 2001) can improve the accuracy of the selectivity estimate made in step 2.C of the “ConsiderNewField” function shown above.

[0210] Our invention is not to be limited to the disclosed embodiments. For example, nothing in this description should be construed as confining the work to the field of database deduplication. Some other areas affected by this discovery include database linking and approximate searching. On the contrary, the invention is intended to cover various modifications and equivalent arrangements as defined in the claims. 

We claim:
 1. A method for dynamically constructing or selecting a query Q from a set of field-value pairs S such that Q will return the maximum number of records from a database D that potentially match S while satisfying a user-defined speed constraint, said method comprising: generating blocking sets by evaluating expected record count associated with queries against said predetermined maximum.
 2. The method of 1 where Q is composed of a set of subqueries q_(i)
 3. The method of 2, where each subquery q_(i) is constructed so that it is estimated to return less than a user-defined maximum number of records c.
 4. The method of 3, where S is first augmented with zero or more field-value pairs which are functions of S to form S′ and then each subquery q_(i) selects records in D that match a subset of S′.
 5. The method of 4 that includes a method for eliminating redundant queries.
 6. The method of 5 that includes a lookup to a data structure containing counts of a subset of the field-value pairs in D.
 7. The method of 1 where Q is executed against D and then the records, W, returned by Q are fed to a matching algorithm that assigns to each w in W a decision on whether w matches, does not match, or is a possible match to S.
 8. The method of 4 where Q is formed by a method for searching the universe of all possible subsets of S′. 