主权项 |
1. A method for recognizing and generating consistent identification keys, performed by at least one computer processor executing computer program instructions stored on a first non-transitory computer-readable medium, the method comprising:
receiving a customized database containing information regarding at least a plurality of key values from a second non-transitory computer-readable medium; determining the existence of a plurality of key values within the customized database; executing computer instructions located on a local non-transitory computer-readable medium, the computer instructions enabling the processor to recognize reoccurring key value patterns within each of the plurality of key values; recording any reoccurring key component patterns within each of the plurality of key values; sorting the reoccurring key component patterns with respect to the number of reoccurrences; recognizing reoccurring key component patterns as potential future selections of potential key components for future key values; generating a possible field array representing one or more possible fields; and populating the known field array with the potential future selections for each of the one or more possible fields. |