ArticlePDF Available

A Review of Current Patient Matching Techniques

Authors:
  • Department of Biomedical Enineering (IMT)

Abstract and Figures

As healthcare organizations strive to improve quality of care and patient safety, it becomes paramount that they identify patients correctly and match records accurately both within and across institutions. Continuous care and population health benefits can be optimized when providers can have a comprehensive view of a patient's health record through seamless health information exchange. Various patient matching techniques have emerged to facilitate accurate patient identification. In this paper, we present a review of existing patient matching techniques, analyzed based on accuracy, cost and execution time.
Content may be subject to copyright.
Informatics Empowers Healthcare Transformation 205
J. Mantas et al. (Eds.)
IOS Press, 2017
© 2017 The authors and IOS Press. All rights reserved.
doi: 10.3233/978-1-61499-781-8-205
A Review of Current Patient Matching
Techniques
Philomena WARUHARIa,b,
1
, Ankica BABICa,c, Lawrence NDERU c
and Martin C. WEREb,e
aDepartment of Information Science and Media Studies, University of Bergen, Norway
b Institute of Biomedical Informatics, Moi University, Kenya
c Department of Biomedical Engineering, Linköping University, Sweden
dJomo Kenyatta University of Agriculture and Technology, Kenya
e Vanderbilt University Medical Center, Nashville, TN, USA
Abstract. As healthcare organizations strive to improve quality of care and patient safety,
it becomes paramount that they identify patients correctly and match records accurately
both within and across institutions. Continuous care and population health benefits can
be optimized when providers can have a comprehensive view of a patient’s health record
through seamless health information exchange. Various patient matching techniques have
emerged to facilitate accurate patient identification. In this paper, we present a review of
existing patient matching techniques, analyzed based on accuracy, cost and execution
time.
Keywords. Patient matching, unique patient identifiers, biometrics, algorithms
Introduction
Patient identifiers help to link patients to their health information within a healthcare facility
and across health care systems. Accurate and unique identification of patients is essential in
ensuring that the right care is provided to the right patient to assure quality and safety. A
patient matching error could result in compromised safety, potentially risking a patient’s life.
Further, poor matching can lead to multiple records for the same patient.
There exist variants of patient identification and record linkage techniques broadly
classified under unique patient identifiers and algorithms, most of which use deterministic or
probabilistic statistical matching approaches. However, research shows that there is no
universally perfect patient-matching algorithm regardless of the level of sophistication [1],
as numerous factors can impact performance. Given the inherent limitations of patient
matching methods, healthcare industry players are on the lookout for the best and most
efficient matching techniques that suit individual settings. This paper reviews patient
matching techniques implemented in several international health care systems over the last
10 years, with an emphasis on accuracy, cost and performance.
1
Corresponding Author. Philomena WARUHARI, e-mail: waruharip@gmail.com
206 P. Waruhari et al. / A Review of Current Patient Matching Techniques
1. Patient Identification and Matching Systems
In an effort to identify each patient uniquely, various techniques have emerged utilizing
common data elements related to the patient (patient identifiers) such as demographics and
related attributes examples include name, gender, date of birth, address and national
identifiers, among others. According to Dixon [2], the main attributes of ideal patient
identifiers are uniqueness, ubiquitous and their unchanging nature.
1.1 Unique Patient Identifiers (UPIs)
There are several nationwide initiatives towards realization of Unique Patient Identifiers
(UPIs) to cover entire populations. The World Health Organization gives guidelines on
generation of UPIs [3]. Unfortunately, the challenges around generating and implementing
UPIs often lead to limited implementations within institutions or facilities, rather than more
broadly. Privacy concerns are often cited as the major drawback to implementing UPIs across
healthcare system networks [4]. Despite these concerns, ample evidence demonstrates the
great potential for UPIs to improve patient safety and care efficiency.
1.2 Name Comparison Techniques
Name matching is a process that determines whether two name strings are instances of the
same name. The two main approaches to name matching with varying degrees of complexity
are Phonetic algorithms and String Similarity indices (pattern matching). While Phonetic
algorithms index words by their pronunciation and hence are language dependent, Similarity
indices algorithms qualifies the difference between strings [5]. Soundex code algorithm,
Metaphone, and Phonex are among the best-known phonetic algorithms, while Levenshtein,
Jaro, Jaro-Winkler and Hamming Code are examples of Similarity distance algorithms. In an
effort to improve matching accuracy, algorithms employing a combination of phonetic and
distance-based algorithms have also been employed, as well as comparison of more than one
attribute. In general, the accuracy of matching algorithms based on name comparison
techniques is affected by errors and variations in names especially during exact matching as
opposed to approximate matching techniques [6]. Misspellings, name transposition, and
linguistic differences across languages can significantly affect performance of these
algorithms. Reported accuracies of Phonetic systems range from 89% to 96% [7].
1.3 Biometric Identification Systems
Deficiencies in UPIs and name matching algorithms have led to exploration of the role for
biometric-based approaches for patient matching. Biometrics technology focus on personal
traits of the individual [8]. Common human traits used in biometric identification systems
include fingerprints, retina, iris, face, signature, and gait, among others. Biometric
identification is deemed superior to other forms of identification techniques because
biometrics are more difficult to steal, exchange or forget. The accuracy of a biometric
identification system is measured through false acceptance rate (FAR), false rejection rate
(FRR), and ‘Failure to enroll’ values. These rates are in turn determined by a score generated
P. Waruhari et al. / A Review of Current Patient Matching Techniques 207
based on the degree of similarity between the extracted and stored feature. While biometric
devices rely on widely different approaches and modalities, their operational process is
largely the same, namely: enrolment where the key features are extracted and matching where
the created template is compared against the stored feature.
Unimodal biometric systems utilizing a single feature can have limitations such as noisy
sensor data, distinctiveness ability, and lack of universality of biometric trait, sometimes
leading to unacceptable FAR and FRR [9]. Recently, multimodal biometric approaches,
incorporating two or more biometric features, have been used and demonstrated significant
improvements in accuracy. Palm vein, iris pattern and fingerprint are the most common
biometrics features used in healthcare identification solutions, but fingerprint and palm vein
may not work well in some situations, such as for newborns.
1.3.1 Fingerprint Recognition Systems
The fingerprint identification systems use an individual’s fingerprints that are unique even
between twins. Fingerprints are the oldest and most widely used biometric marker, and have
low implementation costs. Fingerprints are used in multimodal with face modality to
overcome false negatives rate for individuals whose work involves hand labour [10].
1.3.2 Iris Recognition Systems
Iris recognition algorithms employ methods of pattern-recognition and mathematical
modeling based on high-resolution images of the iris. A major advantage of iris scans over
other biometric methods is their high resistance to false matching due to a high degree of
distinctiveness compared to all other human features [11]. A number of researchers have
proposed fingerprint and iris multimodal biometric systems using varied fusion techniques
for improved FAR and FRR [11].
1.4 Relative Performance of Biometric Identification Systems
The performance of any biometric identification system is assessed by its accuracy, speed,
storage, cost and ease of use. While it was possible to get accuracy measures of different
biometrics from studies as shown in Table 1, cost and execution times are hardly reported.
The cost factor includes acquiring the sensor and implementing the identification system.
Table 1: Recognition rates for different biometric modalities. Sources: [9],[10],[11]
Biometric Modality
Accuracy
Fingerprint
FAR = 0.00001%
Iris
FAR = 1 in 1.2 million
Iris + Fingerprint
FRR = 0.5%
Face
FRR = 2.25 % - 7.29%
Voice
FRR = 1% - 60%
Algorithm execution times are determined by the computing processor speed, machine
configuration, the algorithm itself and the volume of patient identifiers being compared.
208 P. Waruhari et al. / A Review of Current Patient Matching Techniques
2. Discussion
Compared to other patient matching techniques, biometrics approaches are generally deemed
highly reliable at uniquely identifying individuals. An ideal patient matching technique
exhibits best results when overall accuracy is high, execution times and implementation costs
are low. For biometrics systems, accuracy is high or acceptable when the associated cost of
FMR error is low. The costs of the biometrics hardware continue to decrease due to
advancement in technology, making these increasingly appealing.
Despite the benefits biometrics systems have over other patient matching techniques,
their adoption is hampered by stigma given their association with government surveillance.
Cultural objections, privacy concerns and additional infrastructure needs also affect adoption.
Mobile technology penetrance, with devices now fitted with facial and fingerprint readers
will likely revolutionize adoption of these technologies in the healthcare space for
identification.
3. Conclusion
Patient matching is critical to patient safety, high quality care and health information
exchange. Optimal and scalable patient matching approaches need to adopted in a way that
suits each care setting, with special attention paid to the accuracy, cost and execution time of
the algorithm, and with a sensitivity to cultural and infrastructure constraints.
REFERENCES
[1] http://www.modernhealthcare.com/article/20160123/MAGAZINE/301239980?template=print [accessed
on 22/09/2016]
[2] B.E Dixon, “Health Information Exchange: Navigating and managing a Network of Health Information
Systems. Academic press publications”. ISBN 978-0-12-803135-3, 2016
[3] M. J. Thorpy, J. A. Lieberman, T. Roth, and G. S. Owens, “Patient identification.,” The American journal of
managed care, vol. 13, no. 6 Suppl, pp. S132-9, 2007.
[4] RAND Health, Approaches to Patient Identifi cation in a National Health. 2008.
[5] S. J. Grannis, J. M. Overhage, C. Mcdonald, S. J. Grannis, J. M. Overhage, and C. Mcdonald, “Real World
Performance of Approximate String Comparators for use in Patient Matching,” pp. 43–47, 2004.
[6] A. J. Lait and B. Randell, “An Assessment of Name Matching Algorithms,” Department of Computing Science
University of Newcastle upon Tyne, pp. 132.
[7] P. Christen, “A Comparison of Personal Name Matching : Techniques and Practical Issues,” no. Sept 2006.
[8] P. S. Sandhu, I. Kaur, A. Verma, S. Jindal, and S. Singh, “Biometric Methods and Implementation of
Algorithms,” vol. 3, no. 4, pp. 603–608, 2009.
[9] V. Conti, C. Militello, F. Sorbello, and S. Vitabile, “A frequency-based approach for features fusion in
fingerprint and iris multimodal biometric identification systems,” IEEE Transactions on Systems, Man and
Cybernetics Part C: Applications and Reviews, vol. 40, no. 4, pp. 384395, 2010.
10] O. S. Adeoye, “A Survey of Emerging Biometric Technologies,” International Journal of Computer
Applications, vol. 9, no. 10, pp. 15, 2010.
[11] P. Henrique and F. Eduardo, “Iris Recognition in Non-Cooperative Environments,” 2014.
... Further, the technologies have facilitated a public conversation and discourse around pertinent threats in the public health sphere. [8,22] In the Kenyan case, ICT have streamlined the patient referral systems with referring facilities utilizing electronic systems to reserve and refer patients to larger specialized facilities. The Kenya Health Sector Referral Implementation Guidelines of 2014 [23] envisages the use of electronic systems to improve on client referral and management during referral movement. ...
... Similarly, with interoperability emanates the question of how to uniquely identify patients across several systems that have different databases. There thus exists the need to employ various patient matching techniques to facilitate accurate patient identification [22]. ...
Article
Full-text available
Kenya like other developing countries is faced with a burden of disease aggravated by poverty. Communicable and non-communicable diseases are increasing at an alarming rate and straining already overburdened and weak heath systems. Faced with a rapidly growing population, poorly equipped health workforce and meager resources to support the healthcare systems, there is a continuous search for tools to offer better healthcare in these resource constrained settings. ICT for development is one tool that has been adopted to improve access to quality healthcare for populations in resource constrained settings. While the tool has been shown to impact the health care sector positively, the use of ICT has brought in challenges of interoperability and usability of electronic systems in health. In this paper we investigate how Kenya has utilized ICT to spur development in the health sector and the measures she is undertaking to address these challenges. We advance that ICT for development is a tool that needs to be fully exploited by developing countries in order to bridge gaps in healthcare emanating from limited finances, poor infrastructure and an overstretched healthcare workforce.
... The most relevant article [2] does not focus primarily on the technological aspects but on the process aspects associated with patient identification. Also, other review articles [3,4] focus on a general description of solutions and their benefits or problems at the organizational level. On the contrary, this article comes from a technological perspective. ...
Conference Paper
Full-text available
Ensuring the correct identification of the patient is key to matching the correct patients with the proper care (e.g. correct administration of medications and treatments), but it is also applied, for example, to monitoring the patient’s movement in the hospital environment. This scoping review aims to find out what technologies based on unique patient identifiers are used to identify patients in healthcare facilities to increase patient safety and to identify future research trends. PRISMA-ScR guidelines were used, and the search focused on Web of Science and Scopus citation databases from 2000 to February 2024. Thirty-two papers dealing with patient identification methods from the point of view of person identification were found. The solutions found were built on the technologies (linear or 2D) of barcodes, RFID and NFC tags. None of the patient identification solutions found offer complete accuracy due to the human factor, and each solution targets a different problem context associated with a particular type of health facility. Future research can focus on the combination of multiple technologies, including biometric methods, to improve identification and tools to support decisions about the use of technology in a particular context and health facility (e.g. hospitals, medical nursing homes).
... The "Healthcare Financial Management Association Educational Report: The value of precise patient identification" also describes "leveraging software tools and biometric solutions for positive patient identification" in addition to "standardizing processes, such as combining the scheduling, registration, and patient identification processes" [11]. Since the late 2010s, biometrics for healthcare applications has been reported [12]. ...
Article
Immediate verification of whether a patient being examined is correct is desirable, even if the scan ranges change during different examinations for the same patient. This study proposes an advanced biological fingerprint technique for the rapid and reliable verification of various scan ranges in computed tomography (CT) scans of the torso of the same patient. The method comprises the following steps: geometric correction of different scans, local feature extraction, mismatch elimination, and similarity evaluation. The geometric magnification correction was aligned at the scanner table height in the first two steps, and the local maxima were calculated as the local features. In the third step, local features from the follow-up scout image are matched to those in the corresponding baseline scout image via template matching and outlier elimination via a robust estimator. We evaluated the correspondence rate based on the inlier ratio between corresponding scout images. The ratio of inliers between the baseline and follow-up scout images was assessed as the similarity score. The clinical dataset, including chest, abdomen–pelvis, and chest–abdomen–pelvis scans, included 600 patients (372 men, 68 ± 12 years) who underwent two routine torso CT examinations. The highest area under the receiver operating characteristic curve (AUC) was 0.996, which was sufficient for patient verification. Moreover, the verification results were comparable to the conventional method, which uses scout images in the same scan range. Patient identity verification was achieved before the main scan, even in follow-up torso CT, under different scan ranges.
... Several studies reveal lack of interoperability as a well-known impediment to EHRs successful adoption and use [46][47][48][49]. As such, interoperability layer should be incorporated into all EHRs implementations as well as concerted efforts towards nationwide adoption and use of unique patient identifier, which promises to improve patient safety and care efficiency [50]. ...
Article
Full-text available
Background Health facilities in developing countries are increasingly adopting Electronic Health Records systems (EHRs) to support healthcare processes. However, only limited studies are available that assess the actual use of the EHRs once adopted in these settings. We assessed the state of the 376 KenyaEMR system (national EHRs) implementations in healthcare facilities offering HIV services in Kenya. Methods The study focused on seven EHRs use indicators. Six of the seven indicators were programmed and packaged into a query script for execution within each KenyaEMR system (KeEMRs) implementation to collect monthly server-log data for each indicator for the period 2012–2019. The indicators included: Staff system use, observations (clinical data volume), data exchange, standardized terminologies, patient identification, and automatic reports. The seventh indicator (EHR variable Completeness) was derived from routine data quality report within the EHRs. Data were analysed using descriptive statistics, and multiple linear regression analysis was used to examine how individual facility characteristics affected the use of the system. Results 213 facilities spanning 19 counties participated in the study. The mean number of authorized users who actively used the KeEMRs was 18.1% (SD = 13.1%, p<0.001) across the facilities. On average, the volume of clinical data (observations) captured in the EHRs was 3363 (SD = 4259). Only a few facilities(14.1%) had health data exchange capability. 97.6% of EHRs concept dictionary terms mapped to standardized terminologies such as CIEL. Within the facility EHRs, only 50.5% (SD = 35.4%, p< 0.001) of patients had the nationally-endorsed patient identifier number recorded. Multiple regression analysis indicated the need for improvement on the mode of EHRs use of implementation. Conclusion The standard EHRs use indicators can effectively measure EHRs use and consequently determine success of the EHRs implementations. The results suggest that most of the EHRs use areas assessed need improvement, especially in relation to active usage of the system and data exchange readiness.
... Outside of Europe, UPIs are common in such countries as New Zealand [22], China [23], and Israel [24], all of which use their National Identifier (ID) as their patient identification number. However, even though UPIs are widely implemented and constitute a preferred method due to reduced reliance on patient attributes for patient matching, the challenges of generating and implementing UPIs often lead to limited implementations within institutions compared to other care settings [4,14,25,26]. Privacy concerns are also often cited as a major concern in implementing UPIs [25]. ...
Article
Full-text available
Objectives: To identify current patient identification techniques and approaches used worldwide in today’s healthcare environment. To identify challenges associated with improper patient identification. Methods: A literature review of relevant peer-reviewed and grey literature published from January 2015 to October 2019 was conducted to inform the paper. The focus was on: 1) patient identification techniques and 2) unintended consequences and ramifications of unresolved patient identification issues. Results: The literature review showed six common patient identification techniques implemented worldwide ranging from unique patient identifiers, algorithmic approaches, referential matching software, biometrics, radio frequency identification device (RFID) systems, and hybrid models. The review revealed three themes associated with unresolved patient identification: 1) treatment, care delivery, and patient safety errors, 2) cost and resource considerations, and 3) data sharing and interoperability challenges. Conclusions: Errors in patient identification have implications for patient care and safety, payment, as well as data sharing and interoperability. Different patient identification techniques ranging from unique patient identifiers and algorithms to hybrid models have been implemented worldwide. However, no current patient identification techniques have resulted in a 100% match rate. Optimizing algorithmic matching through data standardization and referential matching software should be studied further to identify opportunities to enhance patient identification techniques and approaches. Further efforts to improve patient identity management include adoption of patients’ photos at registration, naming conventions, and standardized processes for recording patients’ demographic data attributes.
Article
Full-text available
In many computer applications involving the recording and processing of personal data there is a need to allow for variations in surname spelling, caused for example by transcription errors. A number of algorithms have been developed for name matching, i.e. which attempt to identify name spelling variations, one of the best known of which is the Soundex algorithm. This paper describes a comparative analysis of a number of these algorithms and, based on an analysis of their comparative strengths and weaknesses, proposes a new and improved name matching algorithm, which we call the Phonex algorithm. The analysis takes advantage of the recent creation of a large list of "equivalent surnames", published in the book Family History Knowledge UK [Park1992]. This list is based on data supplied by some thousands of individual genealogists, and can be presumed to be representative of British surnames and their variations over the last two or three centuries. It thus made it possible to perform what we would argue were objective tests of name matching, the results of which provide a solid basis for the analysis that we have performed, and for our claims for the merits of the new algorithm, though these are unlikely to hold fully for surnames emanating largely from other countries.
Article
Full-text available
The basic aim of a biometric identification system is to discriminate automatically between subjects in a reliable and dependable way, according to a specific-target application. Multimodal biometric identification systems aim to fuse two or more physical or behavioral traits to provide optimal False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus improving system accuracy and dependability. In this paper, an innovative multimodal biometric identification system based on iris and fingerprint traits is proposed. The paper is a state-of-the-art advancement of multibiometrics, offering an innovative perspective on features fusion. In greater detail, a frequency-based approach results in a homogeneous biometric vector, integrating iris and fingerprint data. Successively, a hamming-distance-based matching algorithm deals with the unified homogenous biometric vector. The proposed multimodal system achieves interesting results with several commonly used databases. For example, we have obtained an interesting working point with FAR = 0% and FRR = 5.71% using the entire fingerprint verification competition (FVC) 2002 DB2B database and a randomly extracted same-size subset of the BATH database. At the same time, considering the BATH database and the FVC2002 DB2A database, we have obtained a further interesting working point with FAR = 0% and FRR = 7.28% ÷ 9.7%.
Article
Full-text available
Medical record linkage is becoming increasingly important as clinical data is distributed across independent sources. To improve linkage accuracy we studied different name comparison methods that establish agreement or disagreement between corresponding names. In addition to exact raw name matching and exact phonetic name matching, we tested three approximate string comparators. The approximate comparators included the modified Jaro-Winkler method, the longest common substring, and the Levenshtein edit distance. We also calculated the combined root-mean square of all three. We tested each name comparison method using a deterministic record linkage algorithm. Results were consistent across both hospitals. At a threshold comparator score of 0.8, the Jaro-Winkler comparator achieved the highest linkage sensitivities of 97.4% and 97.7%. The combined root-mean square method achieved sensitivities higher than the Levenshtein edit distance or long-est common substring while sustaining high linkage specificity. Approximate string comparators increase deterministic linkage sensitivity by up to 10% compared to exact match comparisons and represent an accurate method of linking to vital statistics data.
Book
Health Information Exchange (HIE): Navigating and Managing a Network of Health Information Systems allows health professionals to appropriately access, and securely share, patients' vital medical information electronically, thus improving the speed, quality, safety, and cost of patient care. The book presents foundational knowledge on HIE, covering the broad areas of technology, governance, and policy, providing a concise, yet in-depth, look at HIE that can be used as a teaching tool for universities, healthcare organizations with a training component, certification institutions, and as a tool for self-study for independent learners who want to know more about HIE when studying for certification exams. In addition, it not only provides coverage of the technical, policy, and organizational aspects of HIE, but also touches on HIE as a growing profession. In Part One, the book defines HIE, describing it as an emerging profession within HIT/Informatics. In Part Two, the book provides key information on the policy and governance of HIE, including stakeholder engagement, strategic planning, sustainability, etc. Part Three focuses on the technology behind HIE, defining and describing master person indexes, information infrastructure, interfacing, and messaging, etc. In Part Four, the authors discuss the value of HIE, and how to create and measure it. Finally, in Part Five, the book provides perspectives on the future of HIE, including emerging trends, unresolved challenges, etc. • Offers foundational knowledge on Health Information Exchange (HIE), covering the broad areas of technology, governance, and policy. • Focuses on explaining HIE and its complexities in the context of U.S. health reform, as well as emerging health IT activities in foreign nations. • Provides a number of in-depth case studies to connect learners to real-world application of the content and lessons from the field. • Offers didactic content organization and an increasing complexity through five parts.
Article
Computer Security System / technology have passed through several changes. The trends have been from what you know (e.g. password, PIN, etc) to what you have (ATM card, Driving License, etc) and presently to who you are (Biometry) or combinations of two or more of the trios. This technology (biometry) has come to solve the problems identified with knowledge-based and token-based authentication systems. It is possible to forget your password and what you have can as well be stolen. The security of determining who you are is referred to as BIOMETRIC. Biometric, in a nutshell, is the use of your body as password. This paper explores the various methods of biometric identification that have evolved over the years and the features used for each modality.
Article
The homeostatic sleep drive and circadian arousal, each opposing the other, form the neurobiological bases of the sleep and wake states. Many factors can and do disrupt this cycle. Yet, excessive daytime sleepiness is not only common, and it often goes unrecognized. It can contribute to accidents, produce or exacerbate health conditions, reduce efficiency and productivity, interfere with social relationships, and diminish quality of life. The spectrum of common sleep disorders includes circadian rhythm changes, shiftwork requirements, obstructive sleep apnea, narcolepsy, and difficulty in initiating or maintaining sleep, also known as insomnia. In many cases, however, sleep deprivation is the choice of the patient, chosen in response to long commutes, academic rigor, or occupational matters. Regardless of the sleep disorder that a patient has, good sleep behavior or "sleep hygiene" is essential.
Approaches to Patient Identifi cation in a National Health
  • Rand Health
RAND Health, Approaches to Patient Identifi cation in a National Health. 2008.
Biometric Methods and Implementation of Algorithms
  • P S Sandhu
  • I Kaur
  • A Verma
  • S Jindal
  • S Singh
P. S. Sandhu, I. Kaur, A. Verma, S. Jindal, and S. Singh, "Biometric Methods and Implementation of Algorithms," vol. 3, no. 4, pp. 603-608, 2009.
Iris Recognition in Non-Cooperative Environments
  • P Henrique
  • F Eduardo
P. Henrique and F. Eduardo, "Iris Recognition in Non-Cooperative Environments," 2014.