US20140122988A1 - Systems and methods for populating user information on electronic forms - Google Patents
Systems and methods for populating user information on electronic forms Download PDFInfo
- Publication number
- US20140122988A1 US20140122988A1 US14/061,740 US201314061740A US2014122988A1 US 20140122988 A1 US20140122988 A1 US 20140122988A1 US 201314061740 A US201314061740 A US 201314061740A US 2014122988 A1 US2014122988 A1 US 2014122988A1
- Authority
- US
- United States
- Prior art keywords
- information
- user
- field
- electronic form
- fields
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/284—Relational databases
- G06F16/285—Clustering or classification
-
- G06F17/243—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/335—Filtering based on additional data, e.g. user or group profiles
- G06F16/337—Profile generation, learning or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/35—Clustering; Classification
- G06F16/355—Class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
- G06F40/174—Form filling; Merging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
- G06Q30/0204—Market segmentation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0269—Targeted advertisements based on user profile or attribute
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/08—User group management
Definitions
- Various embodiments described herein relate generally to the field of electronic management of information, and more particularly to populating user information on an electronic form, document, webpage or electronic media.
- FIG. 1 illustrates one page of an Income and Expense Declaration that both petitioner and respondent must fill out in a California divorce proceeding.
- the amount and complexity of the information needed for a form such as this typically requires the person completing the form—such as the party to the divorce or an attorney—to spend a significant amount of time obtaining all of the needed information and even performing calculations of information to obtain the desired values.
- a user wishes to get a loan, such as a car loan or mortgage
- the organization providing the loan will often require the user to provide and update certain financial records and information organized in a certain format.
- the electronic form may be a word processing document, template, application-specific form or web page stored within a central forms library and selected by the user for completion or provided by a third-party source via communication with an application, application extension, browser or third-party service.
- a mobile application provides for physical forms to be captured by a camera on a smartphone or tablet, after which the fields are identified and populated onto the captured image of the form or a newly-created template.
- a system for populating user information on an electronic form comprises: a profile creation unit which creates a user profile of user information including a plurality of fields and a plurality of values for the plurality of fields which stores the user information; and an information populating unit which is configured to: identify at least one field on the electronic form; match the identified at least one field on the electronic form with at least one corresponding field in the user profile; and populate the identified at least one field on the electronic form with the value of the matched corresponding field in the user profile.
- a method of populating user information on an electronic form comprising the steps of: creating a user profile of user information including a plurality of fields and a plurality of values for the plurality of fields which stores the user information; identifying at least one field on the electronic form; matching the identified at least one field on the electronic form with at least one corresponding field in the user profile; and populating the identified at least one field on the electronic form with the value of the matched corresponding field in the user profile.
- FIG. 1 is an image of an Income and Expense Declaration form used in a divorce proceeding.
- FIG. 2 is a block diagram illustrating a system for obtaining, classifying and populating personal information on electronic forms, according to one embodiment.
- FIG. 3 is a diagram further illustrating the system for obtaining, classifying and populating personal information on electronic forms, according to one embodiment.
- FIG. 4 is an illustration of the system involved in prepopulating fields of a document, according to one embodiment.
- FIG. 5 is a screen shot of a graphical user interface illustrating a browser extension for implementing the inventive system, according to one embodiment.
- FIG. 6 is an image of a database table listing field identifying numbers, field names and field values, according to one embodiment.
- FIG. 7 is an image of a database table of forms which are stored in the system for automatic completion, according to one embodiment.
- FIG. 8 is an image of a database table which lists field names and field values on each form document stored in the system, according to one embodiment.
- FIG. 9A is a screen shot of a graphical user interface illustrating a web interface for selecting a category of a document for prepopulating user information, according to one embodiment.
- FIG. 9B is a screen shot of a graphical user interface illustrating a web interface for selecting a specific document for prepopulating user information, according to one embodiment.
- FIG. 10A illustrates a graphical user interface of a form with a unique field name that can be automatically identified, stored in the system database, according to one embodiment.
- FIG. 10B illustrates a graphical user interface of the form of FIG. 10A with a value of the unique field stored in the system database populated into the field, according to one embodiment.
- FIG. 11 is an image of a database table which stores a field identifier, field name and field value for the unique field in the form illustrated in FIGS. 10A and 10B , according to one embodiment.
- FIG. 12 is a flow chart illustrating a method of obtaining, classifying and populating personal information onto an electronic form, according to one embodiment.
- FIG. 13 is a block diagram that illustrates an embodiment of a computer/server system upon which an embodiment of the inventive methodology may be implemented.
- the embodiments described herein provide for the collection, organization and use of information for automatically completing, updating and submitting complex electronic documents and online forms, such as online shopping checkout forms; applications for loans, credit cards, health insurance, college or jobs; government-mandated documents required for legal proceedings (such as divorce or bankruptcy); and forms required for or by businesses and business owners.
- Information is obtained from a plurality of different sources and classified through field mapping and other information classification techniques to build an organized database of information related to a user known as an information vault.
- the information is securely stored via encryption and disassociation techniques in one or more user databases to ensure the security of the information.
- a forms database is utilized for storing electronic forms and documents as well as the field information needed to complete the form or document.
- the user can access their information to automatically populate the fields of an online form or an electronic document by selecting a document from the forms database or by utilizing a browser plug-in to populate an online form being displayed in a web browser.
- the system may also be integrated with third party services and websites to populate information on the third party site via secure connections to the user databases, while allowing the user to retain the information in our highly secure database.
- the techniques described herein provide for the ability to quickly and accurately complete, update and submit any type of form on any type of computing device, as the user database builds a profile of the user that includes, for example, identification information, financial information, health information, contact information and historical user information that is classified with high accuracy to ensure that a form is populated with the correct information.
- the user retains full control of any downloading, transmission, editing or deleting of their information and only needs to enter and verify their information once rather than repeat the same process over and over again.
- the systems and methods described herein may be utilized by individuals, groups, entities, governments or businesses for various types of information collection, management and entry. Individual users may populate online forms on their desktop, tablet, smartphone, etc., and be able to instantly complete the form.
- the system may be offered as a mobile application running on a smartphone, tablet or other portable electronic device that would enable a user to complete forms or other documents. With the difficulty of inputting information using small display screens and touchscreen devices, the ability to easily populate information with a portable electronic device is particularly advantageous. Businesses may organize and store information to complete forms such as human resource forms, building permit forms, elevator license forms in various jurisdictions, etc.
- Non-limiting examples include new patient forms for health care, college admissions applications, scholarship applications, financial aid applications, loan applications, medical questionnaires, job applications, insurance forms, legal declaration or proceeding documents, government benefit or service requests, personal health records, ecommerce checkout forms, membership applications, etc.
- FIG. 2 illustrates one embodiment of a system 100 for obtaining, classifying and populating information onto electronic forms, in accordance with one embodiment of the invention.
- Information is obtained from one or more information sources 102 a - c , such as existing forms 102 a , third party application interfaces 102 b or manual user entry 102 c .
- the information is then transmitted to a communications interface 104 , where it is then classified by a server 106 and stored in one or more databases 108 as a user profile of the user's information.
- the communications interface 104 may be in a local area network (LAN) with the information sources 102 or at a remote location from the information sources 102 through connection via the Internet or other wide area network (WAN).
- LAN local area network
- WAN wide area network
- the communications interface 104 will also include one or more information processing units within the server 106 to process the collected information, including a classification unit 106 a which classifies the information to identify fields applicable to the information and values for the fields; a profile creation unit 106 b which creates a user profile with the classified information; and an information populating unit 106 c which populates at least one form field of an electronic form or database by matching the at least one form field with the classified information.
- a field comparison unit 106 d and a user activity collection unit 106 e may also be included, the functions of which will be described further below. Any of the aforementioned units may be located within separate servers or within a single server, depending on the design of the overall system.
- the user may then request that one or more forms 112 be completed using the information in their profile.
- Any type of device may be utilized by the user, including a laptop computer 110 a , desktop computer 110 b , or a portable electronic device 110 c such as a tablet or smartphone.
- the user can interact with the communications interface 104 through the device 110 to complete one or more forms 112 a - c , such as an image viewer 112 a , a form displayed in an internet-browser application 112 b , or a form displayed via an application 112 c running on the portable electronic device 110 c .
- Forms may also be displayed directly in a browser window via HTML5-CSS3 or via an application 112 c interfacing with the server 106 through one or more graphical user interfaces (GUIs) 114 produced by the server 106 that are displayed on the device 110 c .
- GUIs graphical user interfaces
- the forms may be populated directly on the user's device, through a browser extension, add-on browser application, or via an application programming interface (API) interacting with a third party service or application.
- API application programming interface
- FIG. 3 is an illustration of a system diagram illustrating the security protocol of one configuration of the system.
- Users 116 can access the system via the various devices 110 described above, which are connected with the communications interface 104 via the Internet 118 .
- Multiple servers and databases may be utilized and separated between various firewalls for increased protection of the user profile information to ensure privacy and security.
- Users may initially be presented with a GUI showing basic information that is considered the public-facing home site 104 a of the communication interface 104 which is also protected by an initial firewall 120 a .
- the initial firewall 120 a provides overall security for the system and allows access to the user interface and experience level (UI/UX) 104 b of the interface.
- UI/UX experience level
- the UI/UX 104 b includes a web and interface server 106 f connected with a forms and applications output database 108 a .
- a second firewall 120 b protects a third section of the communications interface known as the data access layer 104 c .
- the data access layer 104 c includes business level logic application servers 106 g connected with a database server 106 h which manages a secure client data element and historical archives database 108 b and a mapped input forms database 108 c .
- Separate ID and authentication servers 106 i are also enclosed within the data access layer 104 c , which are connected with an identification database server 106 j which manages a secure client ID element database 108 d.
- FIG. 4 illustrates one embodiment of the steps of populating fields 402 of a form 404 by accessing information stored in the secure client ID element database 108 d and the secure client data element database 108 b through database management software such as the information populating unit 106 c the system components involved in populating an electronic form, where a separate client identification database and client information database are utilized by software at the system server to obtain the information needed to populate an electronic form.
- Information may be obtained from multiple different sources and in multiple different formats in order to obtain a complete set of information for a user.
- the user information may be obtained by having the user complete a “master form” specifically designed to collect information that many of the forms require in a variety of categories (i.e., loan applications, online shopping, college applications, divorce proceedings, etc.).
- the user information may also be collected from existing electronic or non-electronic records, such as financial institution databases, electronic health records, third party information aggregation services (such as Mint.com®), or by the user following simple instructions in the system's web-based user interface.
- the user may need to grant access to one or more of these existing electronic records so that the relevant information can be obtained, and the system may utilize specific Application Programming Interfaces (APIs) to communicate with the third party sites to obtain field and content information.
- APIs Application Programming Interfaces
- existing electronic records it is likely that the information is already classified within a database with specific field names or identifications such that substantial additional classification of the information is not needed; however, due to the complexity of many of the forms such as divorce filings and financial schedules, the database is able to overlay additional computations and reorganize the classifications so that they match the required output of the forms.
- the user may be able to scan or take a picture of the non-electronic document and have the fields and field values extracted through various technologies such as image processing and content extraction software, as is known to one of skill in the art.
- the information may be obtained when a user manually completes an electronic form or document.
- the application may include a browser extension 502 to allow for the form 112 b , fields 504 and content 506 of the fields to be captured, extracted, organized, classified and uploaded to the user's database for future use on the same or other forms.
- the browser extension 502 may provide a popup menu 508 with a Copy Button 510 to copy fields to the user profile, as well as a Fill Fields Button 512 to populate data from the user profile to the form 112 b .
- Blank forms and documents and other user information may also be directly uploaded to the system, where the form or document and its fields can be captured, mapped and stored as templates.
- a credit card application form may be uploaded to the system and stored in the Document Library Database, with the form fields identified so they can be mapped to the corresponding user fields in the database, either manually or using automatic mapping techniques.
- Completed forms and documents may also be directly uploaded to the system, where the form or document, the fields and content of the fields can be captured and extracted.
- a credit card statement or a mortgage statement may be uploaded to the system, where the fields and content in the fields can be extracted and stored in the user database, although the document itself may not be since it is not a form.
- the document itself may be extracted and stored in addition to the fields and content to help the user and other users fill out the forms in the future.
- FIG. 6 illustrates one embodiment of a database table 602 with the field information that is collected from a form that is input into the system. As information is sent from the form being worked on to the server, it gets stored in this table. When information is “pulled” from the server and applied to forms, it comes out of this table.
- the form may be a form such as that illustrated in FIG. 1 and may have been completed by the user such that the form fields have values already entered.
- each field 604 on the form is provided a unique numerical identifier 606 (customerFieldDefaults_Id) to distinguish it from other fields. As shown in the right two columns, each field is also given a field name 608 (fieldName) and field value 610 (fieldValue).
- the field name may be the name encoded on the form itself which can be extracted from the form if it is on a website or an electronic form with field name metadata that has already identified the field name based on the programmer that created the original form.
- the field value (if available) will obviously correspond to the content of the field.
- the associations between field names and field values (known as name-value pairs) are important for classifying content and building the user profile.
- FIG. 7 illustrates a document library table 702 which stores a list of documents 704 that are stored in the system.
- the documents each are provided a document identification 706 (document_id), document title 708 , and path 710 to the document in an associated database.
- FIG. 8 illustrates a database table 802 which stores the field names 804 of each document in the Document Library Table of FIG. 7 .
- the commonFieldName 806 is a human-readable version of fieldName 804 in the cases where fieldName is obscure or poorly named by the original form designer.
- commonFieldName 806 allows the system to quickly match the field with field names found in a typical customer's vault.
- the commonFieldName 806 provides for more simple mapping of fields with field names found in a user profile.
- FIGS. 10A and 10B are illustrations of an online form 1002 with a unique billing code field 1004 in the “Billing” section 1006 which requires the field value to be a unique 33 digit code. If the user has not previously entered the code into the system (which is unlikely given that it is a unique code for a particular form), the user will be required to manually enter the field value 1008 in the field 1004 when completing the form 1002 for the first time, as shown in FIG. 10B . The system will pull the information on the field 1004 (and the value 1008 entered by the user in that field) into the system and list them in a database table 1100 , as illustrated by the table in FIG. 11 . As shown in FIG.
- 11 there are two entries created for this field, as one corresponds to the field name 1102 (digit) and one corresponds to the field value 1104 (the 33 digit number).
- an additional line entry (not shown) is created to associate the radio button next to the field with the field and the field value. This will be useful when the form is being populated in the future, as the system will know to activate/select the radio button when filling in the field value.
- third party services and websites may provide information about forms and documents hosted on their own sites for storage on the system, such as the field names and other document or form-identifying information.
- the user can request that the third party service obtain the user's information from the user database for populating into the form or document at the third party site.
- the third party service can then maintain their customized form or document on their website or application, and the user can ensure that the content populated into the form or document accurately corresponds to the content needed for each field since the third-party service provided the field information to the system.
- users are provided with additional security of the information, as the information is stored on the system database rather than the third party service's database, reducing the chance that the information could be stolen from the third party service or site.
- the third-party service may integrate the embodied system within their website or application so that information stored in the application or at a third-party server is shared with the system and utilized to complete forms and other documents. Similarly, the integration may provide for sharing of the user's information with the third-party site or application for completion of forms or documents at the third-party site.
- the information sources are used to build a profile of each user by collecting information of the user from the various sources and compiling the information into an organized list of information that can be used to populate fields or supplement information of any type and on any form.
- the information obtained from the various information sources discussed above is used to build a user profile of an individual user which ideally includes comprehensive information on the user's finances, contact information, health information and historical information.
- the user profile may include the user's name, birth date, age, current and past addresses, phone numbers, e-mail addresses, social security or government identification number, employment information (current and historical), salary, height, weight, race, bank account numbers, account balances, user names, passwords, education information, health risks, allergies, medications, etc. This list is by no means comprehensive.
- the user profile may also include information not directly related to the user, such as a name and phone number of an emergency contact person, family names and relationships, service provider contact information and notes, business contact information, business prospects, CRM, etc.
- Access to the system may be provided by an application interface through software running on a computing device such as a desktop or laptop, or through an application running on a portable electronic device such as a tablet or smartphone. Additionally, the system may be accessible over a web-based application interface, where all of the user's information is securely stored in a secure server facility in a cloud-based network.
- the information may be stored in at least two or three separate databases that are purposely decoupled in order to provide enhanced security by minimizing the risk of hacking into one of the databases.
- the databases may be divided into a Document Library Database which stores form and document templates, field information and other form properties; a Customer Personal Vault Database which stores the information that includes the fields and field values for each specific user; a User Identity Database which stores information relating to the user's identity (separately from other information for security reasons) and a Customer Orders and Completed Documents Database that stores previously-completed forms in terms of the fields and values that were completed.
- the information will likely be classified into distinct categories so that it can be accurately populated or supplemented into an appropriate field of a form. Furthermore, as will also be described below, the potential risk of theft of such a wealth of personal information is mitigated by specialized proprietary encryption and storage techniques to prevent the information from being stolen or from being useful even if it is stolen.
- Identifying which information belongs in which fields within a form is one of the most difficult challenges for populating forms. While many information fields contain names which easily and readily identify the value that belongs in that particular field, some names are ambiguously named, some fields have slightly differing names between different forms, some fields have identical names within the same document, and some fields have multiple values associated with the same field.
- a document library stores standard document templates which may be copied into a user's workspace and filled in on-demand.
- the document library would in this case store the document's fillable fields and possible default values in a “Fields” table.
- fields and values unique to each user are applied and mapped to blank documents. This set of unique user information will grow over time into a large vault of information.
- actual fields and values assigned to a document are filled in and saved by the user, such that the values are locked to a completed document.
- the section of the document in which each field appears can be used to identify whether the values for each field should be different.
- the system database may therefore store a “field section” entry as a category in the database for each field, so that fields with the same name can be disambiguated based on which section they are in.
- a field name may be completely random and provide no indication as to how it maps to another field or a particular field value.
- the field names may be coded for another system which reads the specific codes with a computer and a specialized numerical or letter key code. For example, a “First Name” field may be named “fn0045586.” For PDF documents stored in the document library, an additional “helper” attribute may be added to the field record called “commonFieldName.” When the document is inputted, the poorly named field will be manually translated to something that is easily mapped.
- a solution would be to provide a drop-down menu or other selection method where the user can select which value to input into the particular field.
- the field is populated with the most recently-used value or the most frequently-used value.
- a document may name a field one way while another document names the same field another way.
- a first document may have a field named “First Name,” while a second document may have a field named “frame,” and yet a third document has a field named “firstname”—all of which are referring to the same field and should contain the same value or content.
- a user FieldDefaults table in the system database is provided with a “userFieldCollections” record that lists the various field names that are synonymous. For example, over time there will be multiple fields stored in the database each containing the same value.
- a problem occurs when there are commonly labeled field names, for example a field name labeled “myFirstName” and another field (likely in a different form) labeled “customerFirstName.” Since these field names clearly correspond to the same information (a user's first name), in order to map “myFirstName” to “customerFirstName,” a machine learning classification library is applied to learn from existing mapped fields from other users and then assign a recommended mapping between a user's field and a document's field.
- the system disassociates a user's identifiable information from their other information.
- the user's name, social security number, birthday, employer identification, etc. is stored in a separate database (or separate database table on the same database) from the user's other information, such as their credit card number, bank accounts, education, grades, etc.
- the identifiable information is additionally stored without any logical connection to other identifiable information of the same user, such that each identity information field is effectively stored on its own island within the database.
- Each item of information may furthermore be encrypted individually and then stored in a table anonymously with other information, without any indexing, organization or grouping of the table, so that the table is unable to provide any useful information about a user on its own.
- the encrypted information can only be decrypted with a key, and optionally in some cases, the key is individually generated for each separate item of information so that the key cannot be misused to unlock other items.
- the key is stored in a separate database and may only be obtained when a user logs in with the correct password. Thus, by disassociating the information that makes up the user's identity, it is impossible to determine enough of a user's information to effectuate identity theft simply from accessing the database and the tables listed therein.
- a user's social security number stored on its own and apart from other information (such as the user's name) is not useful for perpetuating identity theft.
- SSN social security number
- the system provides two highly-secure methods of protecting the information stored in the database.
- three separate databases are used to obtain information, and each database may be connected to the network using a separate server, which may be behind a separate firewall.
- a first database may be configured to store the user's username and password. If successful in entering the username and password, a secret key is generated which will then be supplied to a second database which is solely used to store secret keys for each user.
- a third database maintains the actual information and must be unlocked with the secret key from the second database in order to be read through an encrypted mapping to re-associate the islands of information.
- the system may be configured, in one embodiment, to automatically classify and store any inputted information into the user's profile without requiring a specific indication from the user. Additionally, as user information will continue to be obtained during the user's normal activities, newly-input information will either act to update existing information or be added to a list of values for the same information field that the user can then select from when populating a form.
- the user's information may be stored in its own database known as the personal information vault, and therein within a table called “customerFieldDefaults.”
- the customerFieldDefaults table will usually contain the most current information for the user.
- existing user profile data may be analyzed to derive additional related information.
- the additional related information may be derived by performing comparisons or calculations of existing data, such as by analyzing financial data to determine a budget of regular income and expenses.
- the additional related information may be derived from external sources in order to provide the user with a more complete picture of certain aspects of their profile. For example, if a user enters a list of assets into their user profile that includes a vehicle year, make and model, the system may obtain an estimated value for the vehicle from an external database or third party service. In another example, if the user enters the title of a collectable piece of artwork, the system may obtain additional information on the art, such as the artist, year produced and an estimated value. This information could be used to fill out an insurance application or a claim for the item in the event of a loss.
- the user activity collection unit 106 e of FIG. 2 monitors user activity (such as information inputs, forms filled, etc.) when using the system and generates, collects and stores predetermined descriptive codes, based on their activity and information, into a separate database.
- the codes may correspond to a user's current life status, demographic profile, preferences, financial balances, and other parameters which are associated with a user's account, but do not collect, disclose, or compromise their specific information. These codes can subsequently be used to determine targeted marketing and other strategies for that user for promoting third-party product and service offerings, which effectively better target their needs and desires for those products or services.
- the codes may also be provided with a confidence value relating to the likelihood that the code applies to the user based on factors relating to the type of form, the use of other related forms, etc.
- a user completing a college application may generate a code that relates to the likelihood that the user is about to enter college, which will then provide opportunities to market college-related products or services to the user. If the user completes a college application and a financial aid application, the confidence value relating to the code indicating that the user is about to enter college may jump higher. This may be used to present an advertisement to the user within the graphical user interface that is targeted to their life status, such as an ad for a college.
- the system can save the final version of the form within a specific database table known as the customerFieldContent.
- the information stored in the form can be locked and will not be updated as other user information is updated, unless the user specifically accesses the previously-completed form, edits the form itself and creates a new version.
- the stored completed forms may be time and date stamped, to create a complete archive of the user's activities within the system.
- the user's information may be shared with other related parties that would like portions of their profiles to be shared. For example, spouses, children, parents, brothers and sisters and other family members may share similar information, such as addresses, telephone numbers, family history, etc. that will also be universally updated if one of the items is changed.
- This will provide convenience in avoiding entering repetitive information among family members and allow for global updates to shared information and allow family members to collaborate on an application, such as the FAFSA (Free Application for Federal Student Aid).
- the FAFSA application has certain sections for the Student to complete and other sections that Parents are required to complete.
- Another example is children applying for college can access shared family information that another sibling has already input into that sibling's user profile, such as addresses, parents' names, occupations, etc.
- an update to the home address by one family member may be updated or offered for updating across the other family members in the same group who also had an identical home address previously listed.
- various employees of a company could collaborate in order to complete the company's government or other filings or reports; in another example, a database of health records for one generation of a family could be transferred to a second generation to provide information to the second generation about potential genetic health information.
- information from each family/company member could be stored in a separate vault of the database, and the database would then form links between common information among the family/company members so that each member can maintain the privacy of their separate information.
- the user can select one of several methods. If the form or document is stored in the forms database at the system server, the user can select the form from a list of document categories 902 or specific documents 904 , as illustrated in the attached graphical user interface of a web-based application interface 900 in FIGS. 9A and 9B . In addition, the user may be able to search for the form using a search tool or browse through the categories 902 to find the form based on the type of form (financial, academic, health care, etc.).
- an application extension is provided for quick access to populate a form being viewed in an application window, as shown in the attached illustration of a graphical user interface of a browser extension drop-down menu in FIG. 5 .
- the extension may be displayed as an icon, menu item, supplement or otherwise in the application menus or elsewhere, and upon selection of the icon, a window opens with options to populate information from the user's profile to the fields displayed in the application window.
- the application may be an Internet browser, a word processor, image viewer, spreadsheet or presentation software, although these examples, as all examples and embodiments herein, are not limited hereto.
- an application extension may also be used to extract information from or supplement a form, document or webpage being displayed in an application window. This extracted information can be uploaded to the user's personal information database.
- an application extension may also be used to display, and allow for modification of, user stored contact, CRM and/or contact related information related to form-fields recognized by the system while viewing a third party website such as on LinkedInTM FacebookTM or ZillowTM websites.
- a user is shown a pop-up or drop-down window while viewing one of their LinkedInTM contact which allows them to view, modify, or directly add unique and private information about that particular contact back into their personal user database, without necessarily sharing that information with LinkedInTM or the other users of LinkedInTM.
- the user is augmenting the LinkedIn information with the user's personal notes on that contact, and securely storing that information for personal use in their information database.
- a user defined as operating a real-estate business is shown a pop-up or drop-down window while viewing a specific listing on Zillow.comTM which allows them to view, modify, or directly add unique and private information about that particular property back into their personal user database.
- This allows the real-estate business user to collect useful business information (e.g., the list of clients shown a particular property, listing details, showing schedules, etc.) which may enable them to be more effective in their business.
- a third-party service provider may also incorporate access to the system into their own application, such as a web-based application or a mobile application running on a portable electronic device.
- a website run by an academic institution may integrate access to the system into their application for applying for admission, such that upon loading the admissions application, the user can log in and then access their information to populate the admissions application directly through the website.
- an internet shopping website may integrate access to the system database so that when the user is ready to check out and purchase goods or services from the website, a button, link or authentication dialogue will be available for the user to select and then populate their information onto a payment screen.
- the integration with the third-party application may provide additional security to the user, as it may be configured so that the third-party service provider cannot view or store the user's information, and instead only requests it from the system database at checkout and then deletes it once the transaction is complete.
- the applications may be offered as standalone products or as web-based products and services.
- the application may be offered as a portable document format (PDF) filler application, where the application operates to populate information in a PDF document.
- PDF portable document format
- the PDF filler may be a web-based application or integrated as a browser extension, as has been previously discussed.
- the application may also be offered as a web-based form filler that is designed to complete forms and documents found online.
- the system may be offered as a mobile application running on a smartphone, tablet or other portable electronic device that would enable a user to complete forms or other documents. With the difficulty of inputting information using small display screens and touchscreen devices, the ability to easily populate information with a portable electronic device is particularly advantageous.
- a user visiting an urgent care or emergency room facility may be required to fill out several forms, and could instead be provided with a website to access the forms and utilize the inventive systems to populate the form fields and submit the form online.
- the mobile-based applications may be standalone or integrated into other mobile applications or native device applications.
- the system may be integrated with the camera of a portable electronic device, such that a user can take a picture of a blank form or document and utilize the system to populate the form fields before transmitting the completed document.
- a third party application may integrate with the system and the user profile to provide a partial or complete transfer of user profile data from the system to a third party user profile without requiring the user to view a form with the fields in the third party user profile.
- a third party service such as a social media service or an ecommerce service may be asked to complete a user profile simply by requesting that their user profile generated on the system be transferred to the third party application and corresponding server and database. The user may only need to select an option to instantly transfer all of their user profile information to the third party user profile without needing to view the web-based form corresponding to the user profile.
- the instant transfer may be completed by having the third party application send a list of field names to the server, which will then access the database tables to identify the value or values corresponding to the matching field names stored in the user profile.
- the matching field values will then be transferred back to the third party application server and database to complete the third party user profile.
- Additional methods of transferring select user profile information automatically to another form, database, device or destination may be provided, and would eliminate the need for the user to manually review the form fields and content as it is being filled in or transferred to another location.
- the user may be provided with a form completion indicator which indicates how much of a form can be filled from the information in the user profile.
- the form completion indicator may be displayed alongside a list of possible forms that the user is selecting from, so that the user can determine which form is easiest to populate based on the form completion indicator.
- the indicator may be a symbol, color or even just a numerical value indicating the percentage of fields in the form which will be filled in from information stored in the user profile.
- the form completion indicator will be updated in real time and help the user select a form from the forms database or an online web form which is easiest to automatically populate and has few manual entries.
- the completion indicator may also provide the user with an indication of how much of a given category has been mapped or how much work is required to complete the unfilled fields.
- One embodiment for populating the form fields may be aided by voice, touch, gestures or an input device—or a combination of any of the three.
- the voice and touch input eliminates the need for any manual typing of any information being input into a form.
- Voice input may be utilized through a microphone on the computing device, while the touch and gesture inputs may be made through a touchscreen, touchpad, image capture device or motion capture device.
- the input device includes a mouse, stylus or other peripheral device connected with the computing device which permits a selection to be made on the graphical user interface.
- manual input of a value for a field may be completed by displaying a separate window, such as a pop-up or drop-down menu, with options for values that the user can speak, touch or select with the input device.
- the interaction may include one or more separate input types, such as touching the field on a touch screen to generate the window and then speaking the name of the desired value from a list of field values.
- Form input fields may also display windows with tips or annotations associated with the system database to assist users in completing a form.
- a touch input on the field will initiate an input via voice, while a “touch and hold” input will initiate the display of the separate window with multiple possible values.
- the need for manual input will arise whenever the user profile lacks a value for a field, or even when the system is designed to select a best-fit value from multiple possible values based on one or more criteria.
- the user may be provided with the option to manually input a value in a particular field if no value exists or in order to override the automatically filled value. For example, a user may list multiple different allergies in their user profile (i.e. eggs, bees and cats) such that a form field labeled “food allergies” may be too specific for the system to determine which value of the listed allergies should be automatically input.
- the system may use data from previous user entries by other users to determine that “eggs” is the most likely candidate.
- the user will then be provided with the option to select the field to generate the separate window and then select from the list of allergies in order to correct the selection—for example by adding “bees” or “honey” to the list if the user is allergic to food products made by honey.
- the user may be prompted to manually input a field value with a physical keyboard or touchscreen keyboard interface, through selecting a category to provide a list of options in one or more drill-down menus, or by simply speaking the desired value and letting voice recognition software interpret the voice command and input the appropriate value.
- the user may also be able to speak a partial keyword for the form field which will then display the separate window with possible values that include the partial keyword.
- a lookup algorithm may be provided to associate keywords with possible related values.
- one application for a touch and voice input would be the ability to touch a specific form field and then speak the value that should be input into the field.
- the user can first speak the name of the field if the system cannot identify the field name, which will cause the system to populate the value for the spoken field name from the user profile. If no field value exists for the field name, the user could also then speak the value for the field. If the value entered is a new value, the system will store the value in the user's profile for future use.
- a user filling out an automobile insurance claim and needing to enter a vehicle identification number may be able to touch the field box labeled “VIN” and then state “VIN number” or a similar command, after which the system database will populate the field with the stored VIN number.
- selecting a value to populate in one field may also populate values in related fields. For example, during an eCommerce checkout phase, an on-line merchant prompts the user to input a credit card by displaying a field with such name.
- CSV card security code
- a field has multiple possible values
- the user may be able to touch or speak the field name and then touch, speak or select with a mouse input one of the list of values that is displayed in a drop-down menu or the like.
- the user can speak the name of the section and then the name of the field in order to select a value for the specific field desired. Additional functionality includes the ability to touch or speak a form field and then search for values using keywords.
- the manual input of field values may also be made through specific types of movements in a device configured with a gyroscope or accelerometer which can detect directional movement and velocity.
- a user may be able to shake the device (such as a smartphone or tablet) in order to have the user interface find or populate certain fields. For example, the user can shake the device to populate a blank form, and a more specific gesture such as a vertical tilt will find a particular field name and provide the user with a window and several options for field values to populate into the field name (such as a credit card field name and a list of different credit cards which the user can select from for an electronic transaction).
- the user may be able to touch or speak each unmapped field name and then touch or speak one of the list of categories, sub-categories, and specific category database fields to associate with this form field to the database field.
- the system may also collect and associate multiple user mappings of form fields to database fields using machine intelligence algorithms and then store the associated field mappings with the form into the forms database, thereby providing for an accurately mapped new form for use by all users of the system.
- This embodiment allows for system users to independently add, and map, new forms that are not currently in the system for the benefit of all system users. Additionally, it allows for system users to independently map web-form-fields to the database category fields for web-forms that have not yet had their fields mapped (associated) in the system for the benefit of all system users.
- the system will denote the changed value and store the newly-input value in the system database, preferably in the information vault of the user's profile. The user can therefore update their profiles automatically while changing the information being input into a form.
- a method of obtaining, classifying and populating electronic forms is illustrated by the flow diagram in FIG. 12 .
- the information is obtained from one or more sources of information, such as existing forms, third party APIs, etc.
- the information is then classified in step 204 to determine at least one field to which the information belongs to and to associate the information with the at least one field.
- the plurality of associated information is then aggregated into a user profile in step 206 and securely stored in one or more databases.
- the information in the user profile is matched with the form fields on the form and the information is populated onto the form in step 208 .
- step 210 if the user manually enters values into any form fields, and these values are different from the user's information as currently stored in their secure database, then these new values will be saved into the user's secure database.
- the user's profile can be optionally updated to reflect the new value as being the default or primary value for the field.
- FIG. 13 is a block diagram that illustrates an embodiment of a computer/server system 1300 upon which an embodiment of the inventive methodology may be implemented.
- the system 1300 includes a computer/server platform 1301 including a processor 1302 and memory 1303 which operate to execute instructions, as known to one of skill in the art.
- the term computer-readable storage medium” as used herein refers to any tangible medium, such as a disk or semiconductor memory, that participates in providing instructions to processor 1302 for execution.
- the computer platform 1301 receives input from a plurality of input devices 1304 , such as a keyboard, mouse, touch device or verbal command.
- the computer platform 1301 may additionally be connected to a removable storage device 1305 , such as a portable hard drive, optical media (CD or DVD), disk media or any other tangible medium from which a computer can read executable code.
- the computer platform may further be connected to network resources 1306 which connect to the Internet or other components of a local public or private network.
- the network resources 1306 may provide instructions and information to the computer platform from a remote location on a network 1307 .
- the connections to the network resources 1306 may be via wireless protocols, such as the 802.11 standards, Bluetooth® or cellular protocols, or via physical transmission media, such as cables or fiber optics.
- the network resources may include storage devices for storing information and executable instructions at a location separate from the computer platform 1301 .
- the computer interacts with a display 1308 to output information to a user, as well as to request additional instructions and input from the user.
- the display 1308 may therefore further act as an input device 1304 for interacting with a user.
Abstract
Description
- 1. Field of the Invention
- Various embodiments described herein relate generally to the field of electronic management of information, and more particularly to populating user information on an electronic form, document, webpage or electronic media.
- 2. Related Art
- The vision of a paperless modern society is quickly becoming a reality, as more and more communications, services and transactions take place digitally across networks such as the Internet. The need for paper copies of correspondence, financial documents, receipts, contracts and other legal instruments is dwindling as electronic methods for securely transmitting, updating and accessing these documents increases. In addition to the electronic transmission and access to documents and correspondence, the process of electronically submitting information is also commonplace, such as with online shopping or applications for loans, credit cards, health insurance, college or job applications, etc.
- However, much of the information required in these forms is common to other forms, and yet users manually repeat populating the form inputs with the same information over and over again. The ability to collect, organize, update, utilize and reapply the input information required in these electronic documents, forms and applications remains highly difficult. While some applications have been developed to store certain basic information about a user—such as the user's name, address and financial information—the ability to organize, access and apply this stored information for additional online activities remains very limited, especially when detailed input information and/or computations are required to complete forms such as college applications and family law declarations.
- There are several programs or applications that allow a user to track financial information, budget, forecast, balance spending accounts, etc. While these tools can save time and provide effective tools for budgeting etc., they do not address the numerous circumstances in which a user is required to provide personal information, financial information, forecasts, categorized expenditures, etc., in a specific format or in accordance with specific forms, etc.
- For example, when someone gets divorced, they must provide the court with detailed personal and financial information, both of past records as well as projected needs. This information has to be provided in a very specific state-mandated format using a specific form and it must be updated and submitted to the court at various points during the divorce process, which may last over a long period of time. For example,
FIG. 1 illustrates one page of an Income and Expense Declaration that both petitioner and respondent must fill out in a California divorce proceeding. The amount and complexity of the information needed for a form such as this typically requires the person completing the form—such as the party to the divorce or an attorney—to spend a significant amount of time obtaining all of the needed information and even performing calculations of information to obtain the desired values. As another example, when a user wishes to get a loan, such as a car loan or mortgage, the organization providing the loan will often require the user to provide and update certain financial records and information organized in a certain format. - Even well-organized, financially savvy users using currently available personal financial software tools find completing and updating these forms to be burdensome, time-consuming, confusing, and susceptible to mistake. The applicable forms and other applicable items require much more than basic financial information. Additionally, there is a significant need to accurately complete these forms, as the forms can obviously have a significant impact on whether the applicant qualifies for financial aid, a loan, etc., or receives a favorable outcome in a divorce or other legal proceeding.
- These same challenges apply to other critical life events, such as applying to, and/or paying for college. The college application process is a high anxiety time for students and very often, their parents. There is a lot of detailed information required to complete college and financial aid applications, including but not limited to essays, transcripts, letters of recommendation, activities, photos, etc. Also, college applications and financial aid opportunities have many different deadlines. It is very difficult to stay organized and keep on top of all the information, deadlines and applications submitted.
- Disclosed herein are systems and methods for populating user information onto an electronic form by identifying fields on the electronic form and matching the identified fields with fields stored in a continuously-updated user profile, after which the content of the matched fields are populated onto the electronic form. The electronic form may be a word processing document, template, application-specific form or web page stored within a central forms library and selected by the user for completion or provided by a third-party source via communication with an application, application extension, browser or third-party service. Additionally, a mobile application provides for physical forms to be captured by a camera on a smartphone or tablet, after which the fields are identified and populated onto the captured image of the form or a newly-created template.
- In one aspect of the invention, a system for populating user information on an electronic form comprises: a profile creation unit which creates a user profile of user information including a plurality of fields and a plurality of values for the plurality of fields which stores the user information; and an information populating unit which is configured to: identify at least one field on the electronic form; match the identified at least one field on the electronic form with at least one corresponding field in the user profile; and populate the identified at least one field on the electronic form with the value of the matched corresponding field in the user profile.
- In another aspect of the invention, a method of populating user information on an electronic form, comprising the steps of: creating a user profile of user information including a plurality of fields and a plurality of values for the plurality of fields which stores the user information; identifying at least one field on the electronic form; matching the identified at least one field on the electronic form with at least one corresponding field in the user profile; and populating the identified at least one field on the electronic form with the value of the matched corresponding field in the user profile.
- Other features and advantages should become apparent from the following description of the preferred embodiments, taken in conjunction with the accompanying drawings.
- Various embodiments disclosed herein are described in detail with reference to the following figures. The drawings are provided for purposes of illustration only and merely depict typical or exemplary embodiments. These drawings are provided to facilitate the reader's understanding and shall not be considered limiting of the breadth, scope, or applicability of the embodiments. It should be noted that for clarity and ease of illustration these drawings are not necessarily made to scale.
-
FIG. 1 is an image of an Income and Expense Declaration form used in a divorce proceeding. -
FIG. 2 is a block diagram illustrating a system for obtaining, classifying and populating personal information on electronic forms, according to one embodiment. -
FIG. 3 is a diagram further illustrating the system for obtaining, classifying and populating personal information on electronic forms, according to one embodiment. -
FIG. 4 is an illustration of the system involved in prepopulating fields of a document, according to one embodiment. -
FIG. 5 is a screen shot of a graphical user interface illustrating a browser extension for implementing the inventive system, according to one embodiment. -
FIG. 6 is an image of a database table listing field identifying numbers, field names and field values, according to one embodiment. -
FIG. 7 is an image of a database table of forms which are stored in the system for automatic completion, according to one embodiment. -
FIG. 8 is an image of a database table which lists field names and field values on each form document stored in the system, according to one embodiment. -
FIG. 9A is a screen shot of a graphical user interface illustrating a web interface for selecting a category of a document for prepopulating user information, according to one embodiment. -
FIG. 9B is a screen shot of a graphical user interface illustrating a web interface for selecting a specific document for prepopulating user information, according to one embodiment. -
FIG. 10A illustrates a graphical user interface of a form with a unique field name that can be automatically identified, stored in the system database, according to one embodiment. -
FIG. 10B illustrates a graphical user interface of the form ofFIG. 10A with a value of the unique field stored in the system database populated into the field, according to one embodiment. -
FIG. 11 is an image of a database table which stores a field identifier, field name and field value for the unique field in the form illustrated inFIGS. 10A and 10B , according to one embodiment. -
FIG. 12 is a flow chart illustrating a method of obtaining, classifying and populating personal information onto an electronic form, according to one embodiment. -
FIG. 13 is a block diagram that illustrates an embodiment of a computer/server system upon which an embodiment of the inventive methodology may be implemented. - The various embodiments mentioned above are described in further detail with reference to the aforementioned figured and the following detailed description of exemplary embodiments.
- The embodiments described herein provide for the collection, organization and use of information for automatically completing, updating and submitting complex electronic documents and online forms, such as online shopping checkout forms; applications for loans, credit cards, health insurance, college or jobs; government-mandated documents required for legal proceedings (such as divorce or bankruptcy); and forms required for or by businesses and business owners. Information is obtained from a plurality of different sources and classified through field mapping and other information classification techniques to build an organized database of information related to a user known as an information vault. The information is securely stored via encryption and disassociation techniques in one or more user databases to ensure the security of the information. A forms database is utilized for storing electronic forms and documents as well as the field information needed to complete the form or document. The user can access their information to automatically populate the fields of an online form or an electronic document by selecting a document from the forms database or by utilizing a browser plug-in to populate an online form being displayed in a web browser. The system may also be integrated with third party services and websites to populate information on the third party site via secure connections to the user databases, while allowing the user to retain the information in our highly secure database.
- The techniques described herein provide for the ability to quickly and accurately complete, update and submit any type of form on any type of computing device, as the user database builds a profile of the user that includes, for example, identification information, financial information, health information, contact information and historical user information that is classified with high accuracy to ensure that a form is populated with the correct information. The user retains full control of any downloading, transmission, editing or deleting of their information and only needs to enter and verify their information once rather than repeat the same process over and over again.
- The systems and methods described herein may be utilized by individuals, groups, entities, governments or businesses for various types of information collection, management and entry. Individual users may populate online forms on their desktop, tablet, smartphone, etc., and be able to instantly complete the form. In one embodiment, the system may be offered as a mobile application running on a smartphone, tablet or other portable electronic device that would enable a user to complete forms or other documents. With the difficulty of inputting information using small display screens and touchscreen devices, the ability to easily populate information with a portable electronic device is particularly advantageous. Businesses may organize and store information to complete forms such as human resource forms, building permit forms, elevator license forms in various jurisdictions, etc. Although the examples provided herein relate primarily to the use of the systems and methods for individual users, the benefits and applications also extend to groups of users, entities, governments or businesses of any size and type.
- This solution is unique because once users enter their information once, the information is stored in their information vault, after which they can use it forever for supplying information or completing any forms that require the same repeat information. Non-limiting examples include new patient forms for health care, college admissions applications, scholarship applications, financial aid applications, loan applications, medical questionnaires, job applications, insurance forms, legal declaration or proceeding documents, government benefit or service requests, personal health records, ecommerce checkout forms, membership applications, etc.
-
FIG. 2 illustrates one embodiment of asystem 100 for obtaining, classifying and populating information onto electronic forms, in accordance with one embodiment of the invention. Information is obtained from one or more information sources 102 a-c, such as existingforms 102 a, third party application interfaces 102 b ormanual user entry 102 c. The information is then transmitted to acommunications interface 104, where it is then classified by aserver 106 and stored in one ormore databases 108 as a user profile of the user's information. Thecommunications interface 104 may be in a local area network (LAN) with the information sources 102 or at a remote location from the information sources 102 through connection via the Internet or other wide area network (WAN). Thecommunications interface 104 will also include one or more information processing units within theserver 106 to process the collected information, including aclassification unit 106 a which classifies the information to identify fields applicable to the information and values for the fields; aprofile creation unit 106 b which creates a user profile with the classified information; and aninformation populating unit 106 c which populates at least one form field of an electronic form or database by matching the at least one form field with the classified information. Afield comparison unit 106 d and a useractivity collection unit 106 e may also be included, the functions of which will be described further below. Any of the aforementioned units may be located within separate servers or within a single server, depending on the design of the overall system. The user, through any type ofdevice 110 a-c, may then request that one or more forms 112 be completed using the information in their profile. Any type of device may be utilized by the user, including alaptop computer 110 a,desktop computer 110 b, or a portableelectronic device 110 c such as a tablet or smartphone. The user can interact with thecommunications interface 104 through thedevice 110 to complete one or more forms 112 a-c, such as animage viewer 112 a, a form displayed in an internet-browser application 112 b, or a form displayed via anapplication 112 c running on the portableelectronic device 110 c. Forms may also be displayed directly in a browser window via HTML5-CSS3 or via anapplication 112 c interfacing with theserver 106 through one or more graphical user interfaces (GUIs) 114 produced by theserver 106 that are displayed on thedevice 110 c. As demonstrated herein, the forms may be populated directly on the user's device, through a browser extension, add-on browser application, or via an application programming interface (API) interacting with a third party service or application. -
FIG. 3 is an illustration of a system diagram illustrating the security protocol of one configuration of the system.Users 116 can access the system via thevarious devices 110 described above, which are connected with thecommunications interface 104 via theInternet 118. Multiple servers and databases may be utilized and separated between various firewalls for increased protection of the user profile information to ensure privacy and security. Users may initially be presented with a GUI showing basic information that is considered the public-facing home site 104 a of thecommunication interface 104 which is also protected by an initial firewall 120 a. The initial firewall 120 a provides overall security for the system and allows access to the user interface and experience level (UI/UX) 104 b of the interface. The UI/UX 104 b includes a web andinterface server 106 f connected with a forms andapplications output database 108 a. A second firewall 120 b protects a third section of the communications interface known as the data access layer 104 c. The data access layer 104 c includes business levellogic application servers 106 g connected with adatabase server 106 h which manages a secure client data element andhistorical archives database 108 b and a mappedinput forms database 108 c. Separate ID andauthentication servers 106 i are also enclosed within the data access layer 104 c, which are connected with anidentification database server 106 j which manages a secure clientID element database 108 d. -
FIG. 4 illustrates one embodiment of the steps of populatingfields 402 of aform 404 by accessing information stored in the secure clientID element database 108 d and the secure clientdata element database 108 b through database management software such as theinformation populating unit 106 c the system components involved in populating an electronic form, where a separate client identification database and client information database are utilized by software at the system server to obtain the information needed to populate an electronic form. - Details of the systems and methods are provided further herein with regard to the specific components and features.
- I. Collecting Information and Forms
- Information may be obtained from multiple different sources and in multiple different formats in order to obtain a complete set of information for a user. For example, the user information may be obtained by having the user complete a “master form” specifically designed to collect information that many of the forms require in a variety of categories (i.e., loan applications, online shopping, college applications, divorce proceedings, etc.). The user information may also be collected from existing electronic or non-electronic records, such as financial institution databases, electronic health records, third party information aggregation services (such as Mint.com®), or by the user following simple instructions in the system's web-based user interface. The user may need to grant access to one or more of these existing electronic records so that the relevant information can be obtained, and the system may utilize specific Application Programming Interfaces (APIs) to communicate with the third party sites to obtain field and content information. For existing electronic records, it is likely that the information is already classified within a database with specific field names or identifications such that substantial additional classification of the information is not needed; however, due to the complexity of many of the forms such as divorce filings and financial schedules, the database is able to overlay additional computations and reorganize the classifications so that they match the required output of the forms. For non-electronic records, the user may be able to scan or take a picture of the non-electronic document and have the fields and field values extracted through various technologies such as image processing and content extraction software, as is known to one of skill in the art.
- In one embodiment, the information may be obtained when a user manually completes an electronic form or document. For example, as illustrated in
FIG. 5 , if the user completes aform 112 b displayed on an internet-browser application, the application may include abrowser extension 502 to allow for theform 112 b, fields 504 andcontent 506 of the fields to be captured, extracted, organized, classified and uploaded to the user's database for future use on the same or other forms. Thebrowser extension 502 may provide apopup menu 508 with aCopy Button 510 to copy fields to the user profile, as well as aFill Fields Button 512 to populate data from the user profile to theform 112 b. The information may be extracted and populated even for a complete form that spans numerous pages. Blank forms and documents and other user information may also be directly uploaded to the system, where the form or document and its fields can be captured, mapped and stored as templates. For example, a credit card application form may be uploaded to the system and stored in the Document Library Database, with the form fields identified so they can be mapped to the corresponding user fields in the database, either manually or using automatic mapping techniques. - Completed forms and documents may also be directly uploaded to the system, where the form or document, the fields and content of the fields can be captured and extracted. For example, a credit card statement or a mortgage statement may be uploaded to the system, where the fields and content in the fields can be extracted and stored in the user database, although the document itself may not be since it is not a form. However, if a credit card application or a mortgage application is uploaded the document itself may be extracted and stored in addition to the fields and content to help the user and other users fill out the forms in the future.
-
FIG. 6 illustrates one embodiment of a database table 602 with the field information that is collected from a form that is input into the system. As information is sent from the form being worked on to the server, it gets stored in this table. When information is “pulled” from the server and applied to forms, it comes out of this table. The form may be a form such as that illustrated inFIG. 1 and may have been completed by the user such that the form fields have values already entered. As shown inFIG. 6 , eachfield 604 on the form is provided a unique numerical identifier 606 (customerFieldDefaults_Id) to distinguish it from other fields. As shown in the right two columns, each field is also given a field name 608 (fieldName) and field value 610 (fieldValue). The field name may be the name encoded on the form itself which can be extracted from the form if it is on a website or an electronic form with field name metadata that has already identified the field name based on the programmer that created the original form. The field value (if available) will obviously correspond to the content of the field. The associations between field names and field values (known as name-value pairs) are important for classifying content and building the user profile. -
FIG. 7 illustrates a document library table 702 which stores a list ofdocuments 704 that are stored in the system. The documents each are provided a document identification 706 (document_id),document title 708, andpath 710 to the document in an associated database.FIG. 8 illustrates a database table 802 which stores thefield names 804 of each document in the Document Library Table ofFIG. 7 . Note that there is an option to set a default value for each field. For example, this year's tax form may have a default filing year of 2013. ThecommonFieldName 806 is a human-readable version offieldName 804 in the cases where fieldName is obscure or poorly named by the original form designer.commonFieldName 806 allows the system to quickly match the field with field names found in a typical customer's vault. ThecommonFieldName 806 provides for more simple mapping of fields with field names found in a user profile. - Unique field names and values are stored and organized in the system for future use.
FIGS. 10A and 10B are illustrations of anonline form 1002 with a uniquebilling code field 1004 in the “Billing”section 1006 which requires the field value to be a unique 33 digit code. If the user has not previously entered the code into the system (which is unlikely given that it is a unique code for a particular form), the user will be required to manually enter thefield value 1008 in thefield 1004 when completing theform 1002 for the first time, as shown inFIG. 10B . The system will pull the information on the field 1004 (and thevalue 1008 entered by the user in that field) into the system and list them in a database table 1100, as illustrated by the table inFIG. 11 . As shown inFIG. 11 , there are two entries created for this field, as one corresponds to the field name 1102 (digit) and one corresponds to the field value 1104 (the 33 digit number). In one embodiment, an additional line entry (not shown) is created to associate the radio button next to the field with the field and the field value. This will be useful when the form is being populated in the future, as the system will know to activate/select the radio button when filling in the field value. - In another embodiment, third party services and websites may provide information about forms and documents hosted on their own sites for storage on the system, such as the field names and other document or form-identifying information. Thus, if the user is utilizing the third party service and needs to complete a form or document of the third party service, the user can request that the third party service obtain the user's information from the user database for populating into the form or document at the third party site. The third party service can then maintain their customized form or document on their website or application, and the user can ensure that the content populated into the form or document accurately corresponds to the content needed for each field since the third-party service provided the field information to the system. Additionally, users are provided with additional security of the information, as the information is stored on the system database rather than the third party service's database, reducing the chance that the information could be stolen from the third party service or site.
- In another embodiment, the third-party service may integrate the embodied system within their website or application so that information stored in the application or at a third-party server is shared with the system and utilized to complete forms and other documents. Similarly, the integration may provide for sharing of the user's information with the third-party site or application for completion of forms or documents at the third-party site.
- Other sources of information may be used or envisioned, as would be apparent to one of skill in the art. As will be described further below, the information sources are used to build a profile of each user by collecting information of the user from the various sources and compiling the information into an organized list of information that can be used to populate fields or supplement information of any type and on any form.
- II. Organizing and Storing Information
- The information obtained from the various information sources discussed above is used to build a user profile of an individual user which ideally includes comprehensive information on the user's finances, contact information, health information and historical information. The user profile may include the user's name, birth date, age, current and past addresses, phone numbers, e-mail addresses, social security or government identification number, employment information (current and historical), salary, height, weight, race, bank account numbers, account balances, user names, passwords, education information, health risks, allergies, medications, etc. This list is by no means comprehensive. The user profile may also include information not directly related to the user, such as a name and phone number of an emergency contact person, family names and relationships, service provider contact information and notes, business contact information, business prospects, CRM, etc.
- Access to the system may be provided by an application interface through software running on a computing device such as a desktop or laptop, or through an application running on a portable electronic device such as a tablet or smartphone. Additionally, the system may be accessible over a web-based application interface, where all of the user's information is securely stored in a secure server facility in a cloud-based network.
- In one embodiment, the information may be stored in at least two or three separate databases that are purposely decoupled in order to provide enhanced security by minimizing the risk of hacking into one of the databases. The databases may be divided into a Document Library Database which stores form and document templates, field information and other form properties; a Customer Personal Vault Database which stores the information that includes the fields and field values for each specific user; a User Identity Database which stores information relating to the user's identity (separately from other information for security reasons) and a Customer Orders and Completed Documents Database that stores previously-completed forms in terms of the fields and values that were completed.
- As will be described immediately below, the information will likely be classified into distinct categories so that it can be accurately populated or supplemented into an appropriate field of a form. Furthermore, as will also be described below, the potential risk of theft of such a wealth of personal information is mitigated by specialized proprietary encryption and storage techniques to prevent the information from being stolen or from being useful even if it is stolen.
- Identifying which information belongs in which fields within a form is one of the most difficult challenges for populating forms. While many information fields contain names which easily and readily identify the value that belongs in that particular field, some names are ambiguously named, some fields have slightly differing names between different forms, some fields have identical names within the same document, and some fields have multiple values associated with the same field.
- There are at least three primary circumstances where information needs to be filled in that drive the following field mapping techniques. In a first circumstance, a document library stores standard document templates which may be copied into a user's workspace and filled in on-demand. The document library would in this case store the document's fillable fields and possible default values in a “Fields” table. In a second circumstance, fields and values unique to each user are applied and mapped to blank documents. This set of unique user information will grow over time into a large vault of information. In a third circumstance, actual fields and values assigned to a document are filled in and saved by the user, such that the values are locked to a completed document. Some techniques for solving these problems are addressed below.
- A first solution involves scanning the fields of a document and making associations and inferences as to a “best-fit” field name. In one embodiment, this is completed by utilizing the “for” attribute of a website field code that associates form labels with a field box on the page. For example, a field box with the ambiguous name “box00455x” may be encoded as “label for=”firstname,” so that we can associate the obscure name and the field with the label for “first name.”
- For a situation where there are multiple fields in a document or form with the same or similar field names, the section of the document in which each field appears can be used to identify whether the values for each field should be different. The system database may therefore store a “field section” entry as a category in the database for each field, so that fields with the same name can be disambiguated based on which section they are in.
- In some cases, a field name may be completely random and provide no indication as to how it maps to another field or a particular field value. The field names may be coded for another system which reads the specific codes with a computer and a specialized numerical or letter key code. For example, a “First Name” field may be named “fn0045586.” For PDF documents stored in the document library, an additional “helper” attribute may be added to the field record called “commonFieldName.” When the document is inputted, the poorly named field will be manually translated to something that is easily mapped. For this “First Name” example, our database will record the FieldName record as “fn0045586” and the “commonFieldName” as “First Name.” When a user selects this document, our smart technology will recognize the commonFieldName and easily map that to one of the user's field names that best matches “First Name.”
- In a situation where a user has multiple values associated with the same field name, a solution would be to provide a drop-down menu or other selection method where the user can select which value to input into the particular field. In an alternative embodiment, the field is populated with the most recently-used value or the most frequently-used value.
- In another circumstance, different forms may have different ways to refer to the same user field name. A document may name a field one way while another document names the same field another way. For example, a first document may have a field named “First Name,” while a second document may have a field named “frame,” and yet a third document has a field named “firstname”—all of which are referring to the same field and should contain the same value or content. To enable this association, a user FieldDefaults table in the system database is provided with a “userFieldCollections” record that lists the various field names that are synonymous. For example, over time there will be multiple fields stored in the database each containing the same value. For example, assume each of these 3 “first name” fields will all have the value “Arthur.” A background process executed by the
field comparison unit 106 d ofFIG. 2 will periodically scan the database for other fields with values of “Arthur” and identify those fields within the “userFieldCollections” table as duplicates. This table captures the various field names that are synonymous based on their common content. When any one of these fields is encountered in subsequent forms, the appropriate value of “Arthur” is used. In a second approach, we will pre-set the “userFieldCollections” table with commonly-grouped field values. For example, “firstname” and “First Name” are stored into the table when the field called “firstname” is initially encountered. When a subsequent field called “First Name” in encountered, its value would have already been stored and easily located through the “userFieldCollections” table. - In one example, a problem occurs when there are commonly labeled field names, for example a field name labeled “myFirstName” and another field (likely in a different form) labeled “customerFirstName.” Since these field names clearly correspond to the same information (a user's first name), in order to map “myFirstName” to “customerFirstName,” a machine learning classification library is applied to learn from existing mapped fields from other users and then assign a recommended mapping between a user's field and a document's field.
- In order to protect the user's information from potential theft and misuse, the system disassociates a user's identifiable information from their other information. For example, the user's name, social security number, birthday, employer identification, etc. is stored in a separate database (or separate database table on the same database) from the user's other information, such as their credit card number, bank accounts, education, grades, etc. The identifiable information is additionally stored without any logical connection to other identifiable information of the same user, such that each identity information field is effectively stored on its own island within the database. Each item of information may furthermore be encrypted individually and then stored in a table anonymously with other information, without any indexing, organization or grouping of the table, so that the table is unable to provide any useful information about a user on its own.
- The encrypted information can only be decrypted with a key, and optionally in some cases, the key is individually generated for each separate item of information so that the key cannot be misused to unlock other items. The key is stored in a separate database and may only be obtained when a user logs in with the correct password. Thus, by disassociating the information that makes up the user's identity, it is impossible to determine enough of a user's information to effectuate identity theft simply from accessing the database and the tables listed therein.
- As an example, a user's social security number (SSN) stored on its own and apart from other information (such as the user's name) is not useful for perpetuating identity theft. Given that the SSN is further encrypted into an unrecognizable series of letters and numbers, the system provides two highly-secure methods of protecting the information stored in the database. In one embodiment, three separate databases are used to obtain information, and each database may be connected to the network using a separate server, which may be behind a separate firewall. A first database may be configured to store the user's username and password. If successful in entering the username and password, a secret key is generated which will then be supplied to a second database which is solely used to store secret keys for each user. A third database maintains the actual information and must be unlocked with the secret key from the second database in order to be read through an encrypted mapping to re-associate the islands of information.
- The system may be configured, in one embodiment, to automatically classify and store any inputted information into the user's profile without requiring a specific indication from the user. Additionally, as user information will continue to be obtained during the user's normal activities, newly-input information will either act to update existing information or be added to a list of values for the same information field that the user can then select from when populating a form.
- The user's information may be stored in its own database known as the personal information vault, and therein within a table called “customerFieldDefaults.” The customerFieldDefaults table will usually contain the most current information for the user.
- In one embodiment, existing user profile data may be analyzed to derive additional related information. The additional related information may be derived by performing comparisons or calculations of existing data, such as by analyzing financial data to determine a budget of regular income and expenses. In addition, the additional related information may be derived from external sources in order to provide the user with a more complete picture of certain aspects of their profile. For example, if a user enters a list of assets into their user profile that includes a vehicle year, make and model, the system may obtain an estimated value for the vehicle from an external database or third party service. In another example, if the user enters the title of a collectable piece of artwork, the system may obtain additional information on the art, such as the artist, year produced and an estimated value. This information could be used to fill out an insurance application or a claim for the item in the event of a loss.
- In one embodiment, the user
activity collection unit 106 e ofFIG. 2 monitors user activity (such as information inputs, forms filled, etc.) when using the system and generates, collects and stores predetermined descriptive codes, based on their activity and information, into a separate database. The codes may correspond to a user's current life status, demographic profile, preferences, financial balances, and other parameters which are associated with a user's account, but do not collect, disclose, or compromise their specific information. These codes can subsequently be used to determine targeted marketing and other strategies for that user for promoting third-party product and service offerings, which effectively better target their needs and desires for those products or services. The codes may also be provided with a confidence value relating to the likelihood that the code applies to the user based on factors relating to the type of form, the use of other related forms, etc. - For example, a user completing a college application may generate a code that relates to the likelihood that the user is about to enter college, which will then provide opportunities to market college-related products or services to the user. If the user completes a college application and a financial aid application, the confidence value relating to the code indicating that the user is about to enter college may jump higher. This may be used to present an advertisement to the user within the graphical user interface that is targeted to their life status, such as an ad for a college.
- Each time the user populates information into a form, the system can save the final version of the form within a specific database table known as the customerFieldContent. The information stored in the form can be locked and will not be updated as other user information is updated, unless the user specifically accesses the previously-completed form, edits the form itself and creates a new version. The stored completed forms may be time and date stamped, to create a complete archive of the user's activities within the system.
- In one embodiment, the user's information may be shared with other related parties that would like portions of their profiles to be shared. For example, spouses, children, parents, brothers and sisters and other family members may share similar information, such as addresses, telephone numbers, family history, etc. that will also be universally updated if one of the items is changed. This will provide convenience in avoiding entering repetitive information among family members and allow for global updates to shared information and allow family members to collaborate on an application, such as the FAFSA (Free Application for Federal Student Aid). The FAFSA application has certain sections for the Student to complete and other sections that Parents are required to complete. Another example is children applying for college can access shared family information that another sibling has already input into that sibling's user profile, such as addresses, parents' names, occupations, etc. Furthermore, if a family moves, an update to the home address by one family member may be updated or offered for updating across the other family members in the same group who also had an identical home address previously listed. Similarly, various employees of a company could collaborate in order to complete the company's government or other filings or reports; in another example, a database of health records for one generation of a family could be transferred to a second generation to provide information to the second generation about potential genetic health information.
- To effectuate the family or company sharing option, information from each family/company member could be stored in a separate vault of the database, and the database would then form links between common information among the family/company members so that each member can maintain the privacy of their separate information.
- III. Populating Electronic Forms
- When the user is ready to complete a form or document, the user can select one of several methods. If the form or document is stored in the forms database at the system server, the user can select the form from a list of
document categories 902 orspecific documents 904, as illustrated in the attached graphical user interface of a web-basedapplication interface 900 inFIGS. 9A and 9B . In addition, the user may be able to search for the form using a search tool or browse through thecategories 902 to find the form based on the type of form (financial, academic, health care, etc.). - In one embodiment, an application extension is provided for quick access to populate a form being viewed in an application window, as shown in the attached illustration of a graphical user interface of a browser extension drop-down menu in
FIG. 5 . The extension may be displayed as an icon, menu item, supplement or otherwise in the application menus or elsewhere, and upon selection of the icon, a window opens with options to populate information from the user's profile to the fields displayed in the application window. The application may be an Internet browser, a word processor, image viewer, spreadsheet or presentation software, although these examples, as all examples and embodiments herein, are not limited hereto. - In another embodiment, as discussed in Section I, above, an application extension may also be used to extract information from or supplement a form, document or webpage being displayed in an application window. This extracted information can be uploaded to the user's personal information database.
- In another embodiment, an application extension may also be used to display, and allow for modification of, user stored contact, CRM and/or contact related information related to form-fields recognized by the system while viewing a third party website such as on LinkedIn™ Facebook™ or Zillow™ websites. In one example of this embodiment, a user is shown a pop-up or drop-down window while viewing one of their LinkedIn™ contact which allows them to view, modify, or directly add unique and private information about that particular contact back into their personal user database, without necessarily sharing that information with LinkedIn™ or the other users of LinkedIn™. Essentially, the user is augmenting the LinkedIn information with the user's personal notes on that contact, and securely storing that information for personal use in their information database. In another example, a user defined as operating a real-estate business is shown a pop-up or drop-down window while viewing a specific listing on Zillow.com™ which allows them to view, modify, or directly add unique and private information about that particular property back into their personal user database. This allows the real-estate business user to collect useful business information (e.g., the list of clients shown a particular property, listing details, showing schedules, etc.) which may enable them to be more effective in their business.
- A third-party service provider may also incorporate access to the system into their own application, such as a web-based application or a mobile application running on a portable electronic device. For example, a website run by an academic institution may integrate access to the system into their application for applying for admission, such that upon loading the admissions application, the user can log in and then access their information to populate the admissions application directly through the website. In addition, an internet shopping website may integrate access to the system database so that when the user is ready to check out and purchase goods or services from the website, a button, link or authentication dialogue will be available for the user to select and then populate their information onto a payment screen.
- The integration with the third-party application may provide additional security to the user, as it may be configured so that the third-party service provider cannot view or store the user's information, and instead only requests it from the system database at checkout and then deletes it once the transaction is complete.
- The applications may be offered as standalone products or as web-based products and services. In one embodiment, the application may be offered as a portable document format (PDF) filler application, where the application operates to populate information in a PDF document. The PDF filler may be a web-based application or integrated as a browser extension, as has been previously discussed. The application may also be offered as a web-based form filler that is designed to complete forms and documents found online. Additionally, the system may be offered as a mobile application running on a smartphone, tablet or other portable electronic device that would enable a user to complete forms or other documents. With the difficulty of inputting information using small display screens and touchscreen devices, the ability to easily populate information with a portable electronic device is particularly advantageous. For example, users who are using their mobile device to make a purchase often find it difficult to enter all of their contact information and payment information on a small screen (in addition to having to remember it). The ability to instantly complete these ecommerce form fields will be particularly advantageous to the mobile user. In another example, a user visiting an urgent care or emergency room facility may be required to fill out several forms, and could instead be provided with a website to access the forms and utilize the inventive systems to populate the form fields and submit the form online. The mobile-based applications may be standalone or integrated into other mobile applications or native device applications. For example, in one embodiment, the system may be integrated with the camera of a portable electronic device, such that a user can take a picture of a blank form or document and utilize the system to populate the form fields before transmitting the completed document.
- In another embodiment, a third party application may integrate with the system and the user profile to provide a partial or complete transfer of user profile data from the system to a third party user profile without requiring the user to view a form with the fields in the third party user profile. For example, a user who signs up for a third party service such as a social media service or an ecommerce service may be asked to complete a user profile simply by requesting that their user profile generated on the system be transferred to the third party application and corresponding server and database. The user may only need to select an option to instantly transfer all of their user profile information to the third party user profile without needing to view the web-based form corresponding to the user profile. The instant transfer may be completed by having the third party application send a list of field names to the server, which will then access the database tables to identify the value or values corresponding to the matching field names stored in the user profile. The matching field values will then be transferred back to the third party application server and database to complete the third party user profile.
- Additional methods of transferring select user profile information automatically to another form, database, device or destination may be provided, and would eliminate the need for the user to manually review the form fields and content as it is being filled in or transferred to another location.
- In one embodiment, the user may be provided with a form completion indicator which indicates how much of a form can be filled from the information in the user profile. The form completion indicator may be displayed alongside a list of possible forms that the user is selecting from, so that the user can determine which form is easiest to populate based on the form completion indicator. The indicator may be a symbol, color or even just a numerical value indicating the percentage of fields in the form which will be filled in from information stored in the user profile. The form completion indicator will be updated in real time and help the user select a form from the forms database or an online web form which is easiest to automatically populate and has few manual entries. The completion indicator may also provide the user with an indication of how much of a given category has been mapped or how much work is required to complete the unfilled fields.
- Although the system will populate any field for which it has information, certain fields may have no values or may have multiple values, in which case the field will not be automatically filled. In this situation, the user must take some action in order to populate the field. One embodiment for populating the form fields may be aided by voice, touch, gestures or an input device—or a combination of any of the three. The voice and touch input eliminates the need for any manual typing of any information being input into a form. Voice input may be utilized through a microphone on the computing device, while the touch and gesture inputs may be made through a touchscreen, touchpad, image capture device or motion capture device. The input device includes a mouse, stylus or other peripheral device connected with the computing device which permits a selection to be made on the graphical user interface.
- In one embodiment, manual input of a value for a field may be completed by displaying a separate window, such as a pop-up or drop-down menu, with options for values that the user can speak, touch or select with the input device. The interaction may include one or more separate input types, such as touching the field on a touch screen to generate the window and then speaking the name of the desired value from a list of field values. Form input fields may also display windows with tips or annotations associated with the system database to assist users in completing a form. In one embodiment, a touch input on the field will initiate an input via voice, while a “touch and hold” input will initiate the display of the separate window with multiple possible values.
- The need for manual input will arise whenever the user profile lacks a value for a field, or even when the system is designed to select a best-fit value from multiple possible values based on one or more criteria. The user may be provided with the option to manually input a value in a particular field if no value exists or in order to override the automatically filled value. For example, a user may list multiple different allergies in their user profile (i.e. eggs, bees and cats) such that a form field labeled “food allergies” may be too specific for the system to determine which value of the listed allergies should be automatically input. The system may use data from previous user entries by other users to determine that “eggs” is the most likely candidate. However, the user will then be provided with the option to select the field to generate the separate window and then select from the list of allergies in order to correct the selection—for example by adding “bees” or “honey” to the list if the user is allergic to food products made by honey. If the user has no field values stored for the field name “allergy,” the user may be prompted to manually input a field value with a physical keyboard or touchscreen keyboard interface, through selecting a category to provide a list of options in one or more drill-down menus, or by simply speaking the desired value and letting voice recognition software interpret the voice command and input the appropriate value. The user may also be able to speak a partial keyword for the form field which will then display the separate window with possible values that include the partial keyword. A lookup algorithm may be provided to associate keywords with possible related values.
- As previously discussed, one application for a touch and voice input would be the ability to touch a specific form field and then speak the value that should be input into the field. Alternatively, the user can first speak the name of the field if the system cannot identify the field name, which will cause the system to populate the value for the spoken field name from the user profile. If no field value exists for the field name, the user could also then speak the value for the field. If the value entered is a new value, the system will store the value in the user's profile for future use. In one example, a user filling out an automobile insurance claim and needing to enter a vehicle identification number (VIN) may be able to touch the field box labeled “VIN” and then state “VIN number” or a similar command, after which the system database will populate the field with the stored VIN number. In another embodiment, selecting a value to populate in one field may also populate values in related fields. For example, during an eCommerce checkout phase, an on-line merchant prompts the user to input a credit card by displaying a field with such name. The user touches the field on their mobile touch-device and speaks the word “Chase Visa” and the user's Chase Visa card number, name on that card, card expiration date, and card security code (CSV) are all filled into the associated fields on the checkout form. The advantage to the user is that they need not store any personal credit card numbers with any on-line merchants, yet can still experience a speedy and secure shopping checkout. In addition, as user credit cards expire and are replaced or updated, there is no need for the user to remember to visit each merchant site just to update card changes as those are all stored in one location and securely on the system database.
- In another embodiment, if a field has multiple possible values, the user may be able to touch or speak the field name and then touch, speak or select with a mouse input one of the list of values that is displayed in a drop-down menu or the like. Similarly, if multiple fields have the same name but are in different sections of a form, the user can speak the name of the section and then the name of the field in order to select a value for the specific field desired. Additional functionality includes the ability to touch or speak a form field and then search for values using keywords.
- In addition to gestures, touch and voice inputs, the manual input of field values may also be made through specific types of movements in a device configured with a gyroscope or accelerometer which can detect directional movement and velocity. In one embodiment, a user may be able to shake the device (such as a smartphone or tablet) in order to have the user interface find or populate certain fields. For example, the user can shake the device to populate a blank form, and a more specific gesture such as a vertical tilt will find a particular field name and provide the user with a window and several options for field values to populate into the field name (such as a credit card field name and a list of different credit cards which the user can select from for an electronic transaction).
- In another embodiment, if an entire form, or if one or more fields in a form, have not been completely mapped and/or stored in the system, then the user may be able to touch or speak each unmapped field name and then touch or speak one of the list of categories, sub-categories, and specific category database fields to associate with this form field to the database field. The system may also collect and associate multiple user mappings of form fields to database fields using machine intelligence algorithms and then store the associated field mappings with the form into the forms database, thereby providing for an accurately mapped new form for use by all users of the system. This embodiment allows for system users to independently add, and map, new forms that are not currently in the system for the benefit of all system users. Additionally, it allows for system users to independently map web-form-fields to the database category fields for web-forms that have not yet had their fields mapped (associated) in the system for the benefit of all system users.
- In one embodiment, if the user manually alters a field value for a particular field after the system has populated the field, the system will denote the changed value and store the newly-input value in the system database, preferably in the information vault of the user's profile. The user can therefore update their profiles automatically while changing the information being input into a form.
- Although several applications for the systems and methods have been described above, the applications for the systems and methods should not be considered limited thereto. The systems and methods may be particularly applied for the completion of complex forms and documents which have a variety of form fields, require a significant amount of information or have similar or confusing names and field identifiers. College applications, loan applications, income and expense declarations for family law matters, health care forms and the many forms required for and by small business owners are potential applications that would provide significant improvements in time savings and accuracy of information (not to mention ease frustration or reduce redundancy) by use of the exemplary systems described herein.
- One embodiment of a method of obtaining, classifying and populating electronic forms is illustrated by the flow diagram in
FIG. 12 . In afirst step 202, the information is obtained from one or more sources of information, such as existing forms, third party APIs, etc. The information is then classified instep 204 to determine at least one field to which the information belongs to and to associate the information with the at least one field. The plurality of associated information is then aggregated into a user profile instep 206 and securely stored in one or more databases. When a user requests that a form be completed through one of the client interfaces, the information in the user profile is matched with the form fields on the form and the information is populated onto the form instep 208. Instep 210, if the user manually enters values into any form fields, and these values are different from the user's information as currently stored in their secure database, then these new values will be saved into the user's secure database. The user's profile can be optionally updated to reflect the new value as being the default or primary value for the field. - IV. Computer-Implemented Embodiment
-
FIG. 13 is a block diagram that illustrates an embodiment of a computer/server system 1300 upon which an embodiment of the inventive methodology may be implemented. Thesystem 1300 includes a computer/server platform 1301 including aprocessor 1302 andmemory 1303 which operate to execute instructions, as known to one of skill in the art. The term computer-readable storage medium” as used herein refers to any tangible medium, such as a disk or semiconductor memory, that participates in providing instructions toprocessor 1302 for execution. Additionally, thecomputer platform 1301 receives input from a plurality ofinput devices 1304, such as a keyboard, mouse, touch device or verbal command. Thecomputer platform 1301 may additionally be connected to aremovable storage device 1305, such as a portable hard drive, optical media (CD or DVD), disk media or any other tangible medium from which a computer can read executable code. The computer platform may further be connected tonetwork resources 1306 which connect to the Internet or other components of a local public or private network. Thenetwork resources 1306 may provide instructions and information to the computer platform from a remote location on anetwork 1307. The connections to thenetwork resources 1306 may be via wireless protocols, such as the 802.11 standards, Bluetooth® or cellular protocols, or via physical transmission media, such as cables or fiber optics. The network resources may include storage devices for storing information and executable instructions at a location separate from thecomputer platform 1301. The computer interacts with adisplay 1308 to output information to a user, as well as to request additional instructions and input from the user. Thedisplay 1308 may therefore further act as aninput device 1304 for interacting with a user. - While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not of limitation. The breadth and scope should not be limited by any of the above-described exemplary embodiments. Where this document refers to technologies that would be apparent or known to one of ordinary skill in the art, such technologies encompass those apparent or known to the skilled artisan now or at any time in the future. In addition, the described embodiments are not restricted to the illustrated example architectures or configurations, but the desired features can be implemented using a variety of alternative architectures and configurations. As will become apparent to one of ordinary skill in the art after reading this document, the illustrated embodiments and their various alternatives can be implemented without confinement to the illustrated example. One of ordinary skill in the art would also understand how alternative functional, logical or physical partitioning and configurations could be utilized to implement the desired features of the described embodiments.
- Furthermore, although items, elements or components may be described or claimed in the singular, the plural is contemplated to be within the scope thereof unless limitation to the singular is explicitly stated. The presence of broadening words and phrases such as “one or more,” “at least,” “but not limited to” or other like phrases in some instances shall not be read to mean that the narrower case is intended or required in instances where such broadening phrases may be absent.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/061,740 US20140122988A1 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for populating user information on electronic forms |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261720305P | 2012-10-30 | 2012-10-30 | |
US201261720309P | 2012-10-30 | 2012-10-30 | |
US201261720916P | 2012-10-31 | 2012-10-31 | |
US201261720907P | 2012-10-31 | 2012-10-31 | |
US201361857177P | 2013-07-22 | 2013-07-22 | |
US14/061,740 US20140122988A1 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for populating user information on electronic forms |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140122988A1 true US20140122988A1 (en) | 2014-05-01 |
Family
ID=50548385
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/061,740 Abandoned US20140122988A1 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for populating user information on electronic forms |
US14/061,735 Active 2034-07-23 US9639597B2 (en) | 2012-10-30 | 2013-10-23 | Collecting and classifying user information into dynamically-updated user profiles |
US14/061,734 Active 2034-01-21 US10146850B2 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for collecting, classifying, organizing and populating information on electronic forms |
US14/061,743 Active 2033-11-23 US10614099B2 (en) | 2012-10-30 | 2013-10-23 | Human interactions for populating user information on electronic forms |
US14/061,736 Active 2033-12-18 US9665638B2 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for secure storage of user information in a user profile |
US14/061,748 Active 2034-03-24 US10635692B2 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for tracking, reporting, submitting and completing information forms and reports |
US15/605,860 Active 2034-02-05 US10372733B2 (en) | 2012-10-30 | 2017-05-25 | Systems and methods for secure storage of user information in a user profile |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/061,735 Active 2034-07-23 US9639597B2 (en) | 2012-10-30 | 2013-10-23 | Collecting and classifying user information into dynamically-updated user profiles |
US14/061,734 Active 2034-01-21 US10146850B2 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for collecting, classifying, organizing and populating information on electronic forms |
US14/061,743 Active 2033-11-23 US10614099B2 (en) | 2012-10-30 | 2013-10-23 | Human interactions for populating user information on electronic forms |
US14/061,736 Active 2033-12-18 US9665638B2 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for secure storage of user information in a user profile |
US14/061,748 Active 2034-03-24 US10635692B2 (en) | 2012-10-30 | 2013-10-23 | Systems and methods for tracking, reporting, submitting and completing information forms and reports |
US15/605,860 Active 2034-02-05 US10372733B2 (en) | 2012-10-30 | 2017-05-25 | Systems and methods for secure storage of user information in a user profile |
Country Status (4)
Country | Link |
---|---|
US (7) | US20140122988A1 (en) |
EP (1) | EP2915065A4 (en) |
CA (1) | CA2889996C (en) |
WO (1) | WO2014070950A1 (en) |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150050631A1 (en) * | 2013-08-13 | 2015-02-19 | College Zoom, Inc. | College application tutorial systems and methods |
US20150205777A1 (en) * | 2014-01-23 | 2015-07-23 | Xerox Corporation | Automated form fill-in via form retrieval |
WO2016011456A1 (en) * | 2014-07-18 | 2016-01-21 | FHOOSH, Inc. | Systems and methods for locating, identifying and mapping electronic form fields |
US20160253303A1 (en) * | 2015-02-27 | 2016-09-01 | Hrb Innovations, Inc. | Digital processing and completion of form documents |
US20160275063A1 (en) * | 2013-10-24 | 2016-09-22 | Vmware, Inc. | Transforming html forms into mobile native forms |
US20180011928A1 (en) * | 2016-07-07 | 2018-01-11 | Alibaba Group Holding Limited | Collecting user information from computer systems |
WO2018013357A1 (en) * | 2016-07-15 | 2018-01-18 | Intuit Inc. | Machine learning of context of data fields for various document types |
CN108229174A (en) * | 2017-12-28 | 2018-06-29 | 陕西山利科技发展有限责任公司 | Security risk management system and management method based on cloud data |
US10254929B2 (en) | 2011-08-25 | 2019-04-09 | Vmware, Inc. | User interface virtualization techniques |
US10489377B2 (en) | 2015-02-11 | 2019-11-26 | Best Collect, S.A. De C.V. | Automated intelligent data scraping and verification |
US10546046B2 (en) * | 2013-03-14 | 2020-01-28 | Goformz, Inc. | System and method for converting paper forms to an electronic format |
US10572682B2 (en) | 2014-09-23 | 2020-02-25 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, and transmission of an obfuscated data locator |
US10579721B2 (en) | 2016-07-15 | 2020-03-03 | Intuit Inc. | Lean parsing: a natural language processing system and method for parsing domain-specific languages |
US10579823B2 (en) | 2014-09-23 | 2020-03-03 | Ubiq Security, Inc. | Systems and methods for secure high speed data generation and access |
US10599761B2 (en) * | 2017-09-07 | 2020-03-24 | Qualtrics, Llc | Digitally converting physical document forms to electronic surveys |
US10614099B2 (en) | 2012-10-30 | 2020-04-07 | Ubiq Security, Inc. | Human interactions for populating user information on electronic forms |
US10621276B2 (en) | 2013-10-24 | 2020-04-14 | Wmware, Inc. | User interface virtualization for web applications |
US10629224B1 (en) * | 2016-07-28 | 2020-04-21 | United Services Automobile Association (Usaa) | Vehicle sound analysis |
US20200167413A1 (en) * | 2018-11-28 | 2020-05-28 | Citrix Systems, Inc. | Form template matching to populate forms displayed by client devices |
US10725896B2 (en) | 2016-07-15 | 2020-07-28 | Intuit Inc. | System and method for identifying a subset of total historical users of a document preparation system to represent a full set of test scenarios based on code coverage |
US10748135B2 (en) | 2018-11-30 | 2020-08-18 | Square, Inc. | Offline onboarding of trackable transaction instrument with associated profile |
US10748130B2 (en) | 2016-09-30 | 2020-08-18 | Square, Inc. | Sensor-enabled activation of payment instruments |
US10798089B1 (en) * | 2019-06-11 | 2020-10-06 | Capital One Services, Llc | System and method for capturing information |
USD904450S1 (en) | 2018-04-27 | 2020-12-08 | Square, Inc. | Portion of a display screen with graphical user interface for option selection |
US11049190B2 (en) | 2016-07-15 | 2021-06-29 | Intuit Inc. | System and method for automatically generating calculations for fields in compliance forms |
US11163956B1 (en) | 2019-05-23 | 2021-11-02 | Intuit Inc. | System and method for recognizing domain specific named entities using domain specific word embeddings |
US11202200B2 (en) * | 2014-01-29 | 2021-12-14 | Capital One Services, Llc | Systems and methods for populating online applications using third party platforms |
WO2021249489A1 (en) * | 2020-06-12 | 2021-12-16 | 支付宝(杭州)信息技术有限公司 | Identity profile processing |
US11222266B2 (en) | 2016-07-15 | 2022-01-11 | Intuit Inc. | System and method for automatic learning of functions |
US11238451B1 (en) | 2011-11-22 | 2022-02-01 | Square, Inc. | Authorization of cardless payment transactions |
US11271752B2 (en) | 2019-07-29 | 2022-03-08 | International Business Machines Corporation | Automatic form completion from a set of federated data providers |
US11315108B2 (en) | 2018-11-30 | 2022-04-26 | Block, Inc. | Profile generation and association with multiple transaction cards contemporaneously |
US11349656B2 (en) | 2018-03-08 | 2022-05-31 | Ubiq Security, Inc. | Systems and methods for secure storage and transmission of a data stream |
US11354673B1 (en) * | 2014-08-06 | 2022-06-07 | Block, Inc. | Data security enhancement for online transactions involving payment card accounts |
USD954145S1 (en) | 2016-11-30 | 2022-06-07 | Block, Inc. | Payment card |
US11388308B2 (en) * | 2020-09-15 | 2022-07-12 | Xerox Corporation | Creating label form templates |
US11748380B1 (en) * | 2019-03-08 | 2023-09-05 | United Services Automobile Association (Usaa) | Aggregated application data store |
US11783128B2 (en) | 2020-02-19 | 2023-10-10 | Intuit Inc. | Financial document text conversion to computer readable operations |
Families Citing this family (82)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10417702B2 (en) * | 2011-05-26 | 2019-09-17 | Facebook, Inc. | Dynamically providing a third-party checkout option |
US20140149243A1 (en) * | 2012-11-29 | 2014-05-29 | Red Hat, Inc. | Vendor download integration |
US10068288B2 (en) * | 2012-12-17 | 2018-09-04 | Capital One Financial Corporation | Systems and methods for providing a user interface for facilitating personal payment transactions |
US9916626B2 (en) * | 2013-02-28 | 2018-03-13 | Intuit Inc. | Presentation of image of source of tax data through tax preparation application |
US20140258828A1 (en) * | 2013-03-11 | 2014-09-11 | Brent Lymer | Pick-and-place webform autofill |
US9576066B2 (en) * | 2013-07-31 | 2017-02-21 | Captora Inc. | Webpage form optimization |
US10445417B2 (en) * | 2013-08-01 | 2019-10-15 | Oracle International Corporation | Entry of values into multiple fields of a form using touch screens |
US9276991B2 (en) * | 2013-09-18 | 2016-03-01 | Xerox Corporation | Method and apparatus for providing a dynamic tool menu based upon a document |
US9582484B2 (en) * | 2013-10-01 | 2017-02-28 | Xerox Corporation | Methods and systems for filling forms |
US20150262182A1 (en) * | 2014-03-12 | 2015-09-17 | The Toronto-Dominion Bank | Systems and methods for providing populated transaction interfaces based on contextual triggers |
US10318586B1 (en) * | 2014-08-19 | 2019-06-11 | Google Llc | Systems and methods for editing and replaying natural language queries |
KR102277182B1 (en) * | 2014-08-25 | 2021-07-14 | 삼성전자 주식회사 | Apparatus and method for providing personalization service |
US10452239B2 (en) * | 2014-10-20 | 2019-10-22 | Adobe Inc. | Iterative detection of forms-usage patterns |
JP2016105271A (en) * | 2014-11-19 | 2016-06-09 | 株式会社ウェブサービス・ディベロップメント | Web application execution system, smart device, web application execution method, and program |
US11120512B1 (en) * | 2015-01-06 | 2021-09-14 | Intuit Inc. | System and method for detecting and mapping data fields for forms in a financial management system |
US9696890B2 (en) | 2015-05-06 | 2017-07-04 | International Business Machines Corporation | File-centric form selection based on number of mandatory and optional input fields of a form satisfied by a selection of files |
US10997512B2 (en) | 2015-05-25 | 2021-05-04 | Microsoft Technology Licensing, Llc | Inferring cues for use with digital assistant |
US10176336B2 (en) * | 2015-07-27 | 2019-01-08 | Microsoft Technology Licensing, Llc | Automated data transfer from mobile application silos to authorized third-party applications |
US10929924B2 (en) | 2015-08-25 | 2021-02-23 | Comenity Llc | Mobile number credit prescreen |
US11270384B1 (en) | 2015-09-30 | 2022-03-08 | Massachusetts Mutual Life Insurance Company | Computer-based management methods and systems |
US9805511B2 (en) * | 2015-10-21 | 2017-10-31 | International Business Machines Corporation | Interacting with data fields on a page using augmented reality |
US20170115864A1 (en) | 2015-10-24 | 2017-04-27 | Oracle International Corporation | Visual form designer |
US10037372B2 (en) | 2015-11-13 | 2018-07-31 | Microsoft Technology Licensing, Llc | Automated data replication |
US10296576B2 (en) | 2015-12-08 | 2019-05-21 | International Business Machines Corporation | Filling information from mobile devices with security constraints |
US10742665B2 (en) * | 2016-02-01 | 2020-08-11 | NortonLifeLock Inc. | Systems and methods for modifying file backups in response to detecting potential ransomware |
US10776571B2 (en) * | 2016-05-04 | 2020-09-15 | Google Llc | Dispatch of user input to multiple input fields in a user interface |
US10372804B2 (en) | 2016-05-17 | 2019-08-06 | Bruce HASSEL | Interactive audio validation/assistance system and methodologies |
WO2017218590A1 (en) * | 2016-06-13 | 2017-12-21 | FHOOSH, Inc. | Systems and methods for secure storage of user information in a user profile |
US10271210B2 (en) * | 2016-07-13 | 2019-04-23 | Bank Of America Corporation | System for authenticating a user and enabling real-time approval notifications |
EP3270321B1 (en) * | 2016-07-14 | 2020-02-19 | Kontron Modular Computers SAS | Technique for securely performing an operation in an iot environment |
US20180053252A1 (en) * | 2016-08-16 | 2018-02-22 | Comenity Llc | Mobile credit acquisition with form population |
US10887302B2 (en) * | 2016-09-15 | 2021-01-05 | Oracle International Corporation | Secured rest execution inside headless web application |
US10713373B2 (en) * | 2017-02-09 | 2020-07-14 | Lifesite, Inc. | Computing system with information storage mechanism and method of operation thereof |
US10331624B2 (en) * | 2017-03-03 | 2019-06-25 | Transitive Innovation, Llc | Automated data classification system |
US10572680B2 (en) | 2017-03-21 | 2020-02-25 | Microsoft Technology Licensing, Llc | Automated personalized out-of-the-box and ongoing in-application settings |
CN107358093A (en) * | 2017-07-11 | 2017-11-17 | 成都牵牛草信息技术有限公司 | The method authorized by third party's field to the field value of form fields |
US11340872B1 (en) | 2017-07-21 | 2022-05-24 | State Farm Mutual Automobile Insurance Company | Method and system for generating dynamic user experience applications |
US20190042653A1 (en) * | 2017-08-03 | 2019-02-07 | Paypal, Inc. | Automatic identification of user information |
US11799974B2 (en) * | 2017-08-31 | 2023-10-24 | Microsoft Technology Licensing, Llc | User profile aggregation and inference generation |
US11314214B2 (en) | 2017-09-15 | 2022-04-26 | Kohler Co. | Geographic analysis of water conditions |
US10448762B2 (en) | 2017-09-15 | 2019-10-22 | Kohler Co. | Mirror |
US10887125B2 (en) | 2017-09-15 | 2021-01-05 | Kohler Co. | Bathroom speaker |
US11093554B2 (en) | 2017-09-15 | 2021-08-17 | Kohler Co. | Feedback for water consuming appliance |
US11099540B2 (en) | 2017-09-15 | 2021-08-24 | Kohler Co. | User identity in household appliances |
US10699023B1 (en) * | 2017-11-20 | 2020-06-30 | Amazon Technologies, Inc. | Encryption profiles for encrypting user-submitted data |
US20190295184A1 (en) * | 2018-03-20 | 2019-09-26 | Richard Gray | Financial reporting system and method |
CN108648786B (en) * | 2018-05-16 | 2021-01-08 | 上海术木医疗科技有限公司 | Medical cloud platform data sharing system and method based on third-party service |
US10855802B2 (en) * | 2018-06-08 | 2020-12-01 | Microsoft Technology Licensing, Llc | System and method of creating provisional account profiles |
US11068893B2 (en) | 2018-07-20 | 2021-07-20 | Ford Global Technologies, Llc | Decentralized cloud-based authentication for vehicles and associated transactions |
CN109146457A (en) * | 2018-08-01 | 2019-01-04 | 阿里巴巴集团控股有限公司 | Data input householder method and device |
US11392862B2 (en) * | 2018-09-26 | 2022-07-19 | Rakuten Group, Inc. | Reception system, reception method, and program |
US11004546B2 (en) * | 2018-11-09 | 2021-05-11 | Curantis Solutions | Automated construction of patient care giver tool user interface using three-tiered architecture |
CN109767516B (en) * | 2018-12-14 | 2021-06-11 | 汉海信息技术(上海)有限公司 | Log setting and printing method, setting and printing apparatus, and log system |
US11468508B2 (en) * | 2019-03-13 | 2022-10-11 | Invensense, Inc. | Capturable code for automatically formatting and addressing a text message to apply for an offer |
SG11201908942VA (en) | 2019-03-29 | 2019-10-30 | Alibaba Group Holding Ltd | Securely performing cryptographic operations |
CN110431803B (en) | 2019-03-29 | 2022-11-18 | 创新先进技术有限公司 | Managing encryption keys based on identity information |
SG11201908938PA (en) | 2019-03-29 | 2019-10-30 | Alibaba Group Holding Ltd | Cryptography chip with identity verification |
KR102381153B1 (en) | 2019-03-29 | 2022-03-30 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | Encryption key management based on identity information |
US11093638B2 (en) * | 2019-04-05 | 2021-08-17 | Online Media Holdings Ltd | Distributed management of user privacy information |
US11140170B2 (en) | 2019-04-05 | 2021-10-05 | Online Media Holdings Ltd | Network-based partial and full user identification techniques |
US20200410601A1 (en) * | 2019-06-25 | 2020-12-31 | Verata Health, Inc. | Automated prior authorization request generation and tracking |
US11196750B2 (en) | 2019-07-18 | 2021-12-07 | International Business Machines Corporation | Fine-grained data masking according to classifications of sensitive data |
US10839147B1 (en) | 2019-09-24 | 2020-11-17 | Intersections Inc. | Method, a system and a machine-readable data carrier for classifying input fields and groups of input fields of a webpage |
US11144910B2 (en) | 2020-02-14 | 2021-10-12 | Capital One Services, Llc | System and method for inserting data into an internet browser form |
US11599717B2 (en) * | 2020-03-20 | 2023-03-07 | Capital One Services, Llc | Separately collecting and storing form contents |
US20210326470A1 (en) * | 2020-04-17 | 2021-10-21 | Matthew Raymond Fleck | Data sundering |
US20220035990A1 (en) * | 2020-07-29 | 2022-02-03 | Docusign, Inc. | Automated document tagging in a digital management platform |
CN113258995A (en) * | 2020-09-27 | 2021-08-13 | 中兴通讯股份有限公司 | Fault prediction method, device and computer readable storage medium |
US11841884B2 (en) * | 2021-01-15 | 2023-12-12 | Creative Intell, Inc. | Method to guided contract drafting using an interactive chatbot |
WO2022154846A1 (en) | 2021-01-15 | 2022-07-21 | Creative Intell Inc. | System for collaboration on the drafting of a shared digital contract |
US11803700B2 (en) * | 2021-02-12 | 2023-10-31 | Tekion Corp | Document parser and generator |
EP4050500A1 (en) * | 2021-02-24 | 2022-08-31 | Think Research Corporation | Systems, methods and devices for structured dynamic electronic forms |
CN113094740A (en) * | 2021-03-12 | 2021-07-09 | 广西东信易联科技有限公司 | Internet of things data security storage system and method based on cloud computing |
US11816425B2 (en) * | 2021-03-19 | 2023-11-14 | LockDocks Inc. | Computer system and method for processing digital forms |
US11704484B2 (en) | 2021-04-30 | 2023-07-18 | Bank Of America Corporation | Cross channel digital data parsing and generation system |
US20220405467A1 (en) * | 2021-06-22 | 2022-12-22 | GovPlus LLC | Automatic form completion |
US11615235B2 (en) * | 2021-08-10 | 2023-03-28 | Capital One Services, Llc | Automatic filling of a form with formatted text |
US20230053109A1 (en) * | 2021-08-16 | 2023-02-16 | Sap Se | Generating data regulation compliant data from application interface data |
WO2023073498A1 (en) * | 2021-10-29 | 2023-05-04 | Klarna Bank Ab | A method for validating an assignment of labels to ordered sequences of web elements in a web page |
US20230185522A1 (en) * | 2021-12-10 | 2023-06-15 | Shopify Inc. | Systems, apparatus, and methods for data entry at electronic user devices |
WO2023150275A1 (en) * | 2022-02-03 | 2023-08-10 | Disolve Inc. | Systems and methods for extracting data using flow graphs |
US11907324B2 (en) * | 2022-04-29 | 2024-02-20 | Docusign, Inc. | Guided form generation in a document management system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5563998A (en) * | 1990-10-19 | 1996-10-08 | Moore Business Forms, Inc. | Forms automation system implementation |
US6247029B1 (en) * | 1998-05-01 | 2001-06-12 | International Business Machines Corporation | Web browser form enhancements |
US20030028792A1 (en) * | 2001-08-02 | 2003-02-06 | International Business Machines Corportion | System, method, and computer program product for automatically inputting user data into internet based electronic forms |
US6651217B1 (en) * | 1999-09-01 | 2003-11-18 | Microsoft Corporation | System and method for populating forms with previously used data values |
US6820204B1 (en) * | 1999-03-31 | 2004-11-16 | Nimesh Desai | System and method for selective information exchange |
US20070033118A1 (en) * | 2005-08-02 | 2007-02-08 | Taxscan Technologies, Llc | Document Scanning and Data Derivation Architecture. |
US7343551B1 (en) * | 2002-11-27 | 2008-03-11 | Adobe Systems Incorporated | Autocompleting form fields based on previously entered values |
US20080120257A1 (en) * | 2006-11-20 | 2008-05-22 | Yahoo! Inc. | Automatic online form filling using semantic inference |
US7779345B2 (en) * | 2003-07-30 | 2010-08-17 | Aol Inc. | Reverse mapping method and apparatus for form filling |
Family Cites Families (172)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5367619A (en) | 1990-04-27 | 1994-11-22 | Eaton Corporation | Electronic data entry system employing an expert system to facilitate generation of electronic data forms with complex interrelationships between fields and subforms |
US7299240B1 (en) * | 1992-04-10 | 2007-11-20 | Intellisync Corporation | Method for translating computer data from one record structure to another |
US5664109A (en) * | 1995-06-07 | 1997-09-02 | E-Systems, Inc. | Method for extracting pre-defined data items from medical service records generated by health care providers |
US5924069A (en) | 1997-01-30 | 1999-07-13 | Lucent Technologies Inc. | Voice-control integrated field support data communications system for maintenance, repair and emergency services |
US6681017B1 (en) | 1997-09-03 | 2004-01-20 | Lucent Technologies Inc. | Simplified secure shared key establishment and data delivery protocols for electronic commerce |
US5960080A (en) * | 1997-11-07 | 1999-09-28 | Justsystem Pittsburgh Research Center | Method for transforming message containing sensitive information |
US6067551A (en) | 1997-11-14 | 2000-05-23 | Microsoft Corporation | Computer implemented method for simultaneous multi-user editing of a document |
US6192380B1 (en) | 1998-03-31 | 2001-02-20 | Intel Corporation | Automatic web based form fill-in |
EP1522947A3 (en) | 1998-06-04 | 2005-05-04 | Collegenet, Inc. | Universal forms engines |
US7334184B1 (en) | 1999-03-10 | 2008-02-19 | American Express Travel Related Services Company, Inc. | Method for online information sharing for completing electronic forms |
US7350139B1 (en) * | 2000-06-16 | 2008-03-25 | American Express Travel Related Services Company, Inc. | System and method for utilizing a drag and drop technique to complete electronic forms |
AU7880100A (en) | 1999-07-19 | 2001-02-05 | Infospace, Inc. | Intelligent mapping of field names in an electronic form with standard field names |
US7181438B1 (en) | 1999-07-21 | 2007-02-20 | Alberti Anemometer, Llc | Database access system |
US6088700A (en) | 1999-08-06 | 2000-07-11 | Larsen; Kenneth N. | Automated forms completion for global information network applications |
US20020002563A1 (en) * | 1999-08-23 | 2002-01-03 | Mary M. Bendik | Document management systems and methods |
US7216292B1 (en) * | 1999-09-01 | 2007-05-08 | Microsoft Corporation | System and method for populating forms with previously used data values |
US7630986B1 (en) | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
US7133937B2 (en) | 1999-10-29 | 2006-11-07 | Ge Medical Systems Information Technologies | Input devices for entering data into an electronic medical record (EMR) |
US7434219B2 (en) | 2000-01-31 | 2008-10-07 | Commvault Systems, Inc. | Storage of application specific profiles correlating to document versions |
US9292484B1 (en) | 2000-03-29 | 2016-03-22 | International Business Machines Corporation | Method and system for automatically providing information to an electronic form |
US6981028B1 (en) * | 2000-04-28 | 2005-12-27 | Obongo, Inc. | Method and system of implementing recorded data for automating internet interactions |
AU7593601A (en) | 2000-07-14 | 2002-01-30 | Atabok Inc | Controlling and managing digital assets |
US7257581B1 (en) | 2000-08-04 | 2007-08-14 | Guardian Networks, Llc | Storage, management and distribution of consumer information |
CA2420481A1 (en) | 2000-09-01 | 2002-03-14 | Intuit, Inc. | Automated tax return with universal data import |
US6851087B1 (en) | 2000-10-04 | 2005-02-01 | International Business Machines Corporation | System and method of processing computer form data |
US20020049689A1 (en) | 2000-10-20 | 2002-04-25 | Srinivas Venkatram | Systems and methods for visual optimal ordered knowledge learning structures |
TW518484B (en) | 2000-10-20 | 2003-01-21 | Learningdigital Com Inc | Personal directory and knowledge management system, method and product |
US8281155B1 (en) | 2000-11-02 | 2012-10-02 | Intel Corporation | Content protection using block reordering |
US7103915B2 (en) | 2000-11-13 | 2006-09-05 | Digital Doors, Inc. | Data security system and method |
US7146644B2 (en) * | 2000-11-13 | 2006-12-05 | Digital Doors, Inc. | Data security system and method responsive to electronic attacks |
US20020062342A1 (en) | 2000-11-22 | 2002-05-23 | Sidles Charles S. | Method and system for completing forms on wide area networks such as the internet |
US6941291B1 (en) | 2000-12-07 | 2005-09-06 | Cisco Technology, Inc. | Method and device for a user profile repository |
US20020194062A1 (en) | 2001-04-19 | 2002-12-19 | Leif Linde | Method and system for simulating the distribution of targeted advertising |
US20030014528A1 (en) | 2001-07-12 | 2003-01-16 | Crutcher Paul D. | Light-weight protocol-independent proxy for accessing distributed data |
US7092952B1 (en) * | 2001-11-20 | 2006-08-15 | Peter Wilens | Method for grouping computer subscribers by common preferences to establish non-intimate relationships |
US7117182B2 (en) | 2002-01-08 | 2006-10-03 | International Business Machines Corporation | Method for disaggregating customer data in online transactions to preserve privacy |
US7328225B1 (en) | 2002-03-27 | 2008-02-05 | Swsoft Holdings, Ltd. | System, method and computer program product for multi-level file-sharing by concurrent users |
US20030204602A1 (en) | 2002-04-26 | 2003-10-30 | Hudson Michael D. | Mediated multi-source peer content delivery network architecture |
US7444302B2 (en) * | 2002-06-14 | 2008-10-28 | Ellie Mae, Inc. | Online system for fulfilling loan applications from loan originators |
US10249386B2 (en) | 2002-08-01 | 2019-04-02 | Prosocial Applications, Inc. | Electronic health records |
JP4254178B2 (en) | 2002-09-11 | 2009-04-15 | 富士ゼロックス株式会社 | Distributed storage control apparatus and method |
US7603371B1 (en) * | 2002-12-17 | 2009-10-13 | Vignette Corporation | Object based system and method for managing information |
US7426496B2 (en) | 2004-03-03 | 2008-09-16 | Microsoft Corporation | Assisted form filling |
US8200775B2 (en) | 2005-02-01 | 2012-06-12 | Newsilike Media Group, Inc | Enhanced syndication |
US20050050052A1 (en) * | 2003-08-20 | 2005-03-03 | 3M Innovative Properties Company | Centralized management of packaging data with artwork importation module |
US7500178B1 (en) * | 2003-09-11 | 2009-03-03 | Agis Network, Inc. | Techniques for processing electronic forms |
US20050071342A1 (en) * | 2003-09-25 | 2005-03-31 | International Business Machines Corporation | Data processing for objects with unknown data structures |
US8983061B2 (en) | 2004-02-13 | 2015-03-17 | Ivi Holdings Ltd. | Method and apparatus for cryptographically processing data |
US7660779B2 (en) * | 2004-05-12 | 2010-02-09 | Microsoft Corporation | Intelligent autofill |
US7203699B2 (en) * | 2004-06-28 | 2007-04-10 | Bellamy Robert E | Computerized system for automated completion of forms |
US20060023875A1 (en) | 2004-07-30 | 2006-02-02 | Graunke Gary L | Enhanced stream cipher combining function |
US8839090B2 (en) * | 2004-09-16 | 2014-09-16 | International Business Machines Corporation | System and method to capture and manage input values for automatic form fill |
US7917545B2 (en) | 2004-09-30 | 2011-03-29 | Microsoft Corporation | Web-based data form |
CN101951383B (en) | 2005-01-27 | 2013-06-19 | 美商内数位科技公司 | Method and system for deriving an encryption key using joint randomness not shared by others |
US20060168509A1 (en) * | 2005-01-27 | 2006-07-27 | International Business Machines Corporation | System and method to map favorite values for specific values during electronic form filling |
US20060194186A1 (en) * | 2005-02-28 | 2006-08-31 | Amit Nanda | Method and apparatus for automatically grouping within a networking database and system for parents |
US20070282631A1 (en) | 2005-09-08 | 2007-12-06 | D Ambrosia Robert Matthew | System and method for aggregating and providing subscriber medical information to medical units |
US8346789B2 (en) | 2005-10-03 | 2013-01-01 | Intel Corporation | System and method for generating homogeneous metadata from pre-existing metadata |
US7694134B2 (en) | 2005-11-11 | 2010-04-06 | Computer Associates Think, Inc. | System and method for encrypting data without regard to application |
US7860865B2 (en) | 2005-12-19 | 2010-12-28 | Yahoo! Inc. | System of a hierarchy of servers for query processing of column chunks in a distributed column chunk data store |
GB0601507D0 (en) | 2006-01-25 | 2006-03-08 | Serverside Group Ltd | Image retrieval system |
JP4876616B2 (en) | 2006-02-17 | 2012-02-15 | 富士ゼロックス株式会社 | Data protection device |
JP4807106B2 (en) | 2006-03-02 | 2011-11-02 | 富士ゼロックス株式会社 | Electronic form, electronic document generation apparatus, program, and method |
US20070256005A1 (en) | 2006-04-26 | 2007-11-01 | Allied Strategy, Llc | Field-link autofill |
US20080126357A1 (en) | 2006-05-04 | 2008-05-29 | Wambo, Inc. | Distributed file storage and transmission system |
US8082144B1 (en) * | 2006-05-22 | 2011-12-20 | Intuit Inc. | Tax calculation explanation generator |
CN101110759A (en) | 2006-07-20 | 2008-01-23 | 朗迅科技公司 | Peer-to-peer file download system for IPTV network |
US8484263B2 (en) | 2006-08-17 | 2013-07-09 | University Of Miami | Method for keyless protection of data using a local array of disks |
US7999810B1 (en) | 2006-08-30 | 2011-08-16 | Boice Gina L | System and method for animated computer visualization of historic events |
US8433726B2 (en) | 2006-09-01 | 2013-04-30 | At&T Mobility Ii Llc | Personal profile data repository |
JP2008103988A (en) | 2006-10-19 | 2008-05-01 | Fujitsu Ltd | Encryption communication system, device, method and program |
US8095476B2 (en) | 2006-11-27 | 2012-01-10 | Inquira, Inc. | Automated support scheme for electronic forms |
JP2008139996A (en) | 2006-11-30 | 2008-06-19 | Hitachi Software Eng Co Ltd | Information leakage prevention system and data storage method |
WO2008065342A1 (en) | 2006-12-01 | 2008-06-05 | David Irvine | Data maps |
US20080155664A1 (en) | 2006-12-24 | 2008-06-26 | Zeev Lieber | Identity management system with an untrusted identity provider |
US8688986B2 (en) | 2006-12-27 | 2014-04-01 | Intel Corporation | Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN) |
CA2573516A1 (en) * | 2007-01-08 | 2008-07-08 | Daniel Mccann | Transaction automation and client-side capture of form schema information |
US9842097B2 (en) | 2007-01-30 | 2017-12-12 | Oracle International Corporation | Browser extension for web form fill |
US20080235567A1 (en) | 2007-03-22 | 2008-09-25 | Binu Raj | Intelligent form filler |
US20090006646A1 (en) * | 2007-06-26 | 2009-01-01 | Data Frenzy, Llc | System and Method of Auto Populating Forms on Websites With Data From Central Database |
US20090006940A1 (en) | 2007-06-27 | 2009-01-01 | Hardt Dick C | Simplified Persona Selector and Indication System |
US20090030910A1 (en) | 2007-07-25 | 2009-01-29 | Stephen Bennett | Information storage and management system and method for automating online requests and transactions |
US8396838B2 (en) | 2007-10-17 | 2013-03-12 | Commvault Systems, Inc. | Legal compliance, electronic discovery and electronic document handling of online and offline copies of data |
US8386706B2 (en) | 2008-01-08 | 2013-02-26 | International Business Machines Corporation | Method and system for secure data storage |
US20090222412A1 (en) | 2008-02-29 | 2009-09-03 | Microsoft Corporation | Facet visualization |
US8676683B1 (en) * | 2008-05-29 | 2014-03-18 | Bank Of America Corporation | Business transaction facilitation system |
US8799251B2 (en) * | 2008-06-26 | 2014-08-05 | Microsoft Corporation | Document templates for schema-based data transfer into and out of a data-based application |
EP2159720A1 (en) | 2008-08-28 | 2010-03-03 | Bach Technology AS | Apparatus and method for generating a collection profile and for communicating based on the collection profile |
US8099599B2 (en) | 2008-08-29 | 2012-01-17 | Microsoft Corporation | Controlling access to data streams |
US9307020B2 (en) | 2008-10-02 | 2016-04-05 | International Business Machines Corporation | Dispersal and retrieval of data fragments in a peer-to-peer data backup and archival network |
US8019664B1 (en) * | 2008-10-14 | 2011-09-13 | Intuit Inc. | System and method for completing a form |
AU2008246236B1 (en) | 2008-11-18 | 2009-10-01 | International Business Machines Corporation | Presentation of items arranged in a hierarchy |
JP5802137B2 (en) | 2009-02-05 | 2015-10-28 | ダブリューダブリューパス コーポレイションWwpass Corporation | Centralized authentication system and method with secure private data storage |
US9558510B2 (en) | 2009-02-24 | 2017-01-31 | Ebay Inc. | System and method to create listings using image and voice recognition |
US8228542B2 (en) | 2009-03-31 | 2012-07-24 | 1st Management Services, Inc. | Systems and methods for storing multiple records using identifiers, storage locations, and attributes associated with electronic documents |
US20100274590A1 (en) | 2009-04-24 | 2010-10-28 | Compangano Jeffrey B | Insurance administration systems and methods |
DE102009019319A1 (en) | 2009-04-30 | 2011-01-05 | Sascha Lehner | Method for generating at least one application description |
WO2010132492A2 (en) | 2009-05-11 | 2010-11-18 | Experian Marketing Solutions, Inc. | Systems and methods for providing anonymized user profile data |
US20100293108A1 (en) * | 2009-05-14 | 2010-11-18 | Sam Gurvitch | Automated Practice Management System |
US20110066843A1 (en) | 2009-09-16 | 2011-03-17 | Brent Newman | Mobile media play system and method |
US20110071994A1 (en) | 2009-09-22 | 2011-03-24 | Appsimple, Ltd | Method and system to securely store data |
US8196038B2 (en) | 2009-12-15 | 2012-06-05 | Shutterfly, Inc. | System, method and graphical user interface for managing contacts and calendars within an online card system |
US8468102B2 (en) * | 2009-12-17 | 2013-06-18 | Avaya Inc. | Creation of ad hoc social networks based on issue identification |
US8649521B2 (en) | 2010-01-28 | 2014-02-11 | Cleversafe, Inc. | Obfuscation of sequenced encoded data slices |
US8494872B2 (en) | 2010-02-04 | 2013-07-23 | International Business Machines Corporation | Personalized electronic healthcare management |
US8788583B2 (en) * | 2010-05-13 | 2014-07-22 | International Business Machines Corporation | Sharing form training result utilizing a social network |
US20110289010A1 (en) | 2010-05-21 | 2011-11-24 | Rankin Jr Claiborne R | Apparatuses, methods and systems for an activity tracking and property transaction facilitating hub user interface |
KR101103403B1 (en) | 2010-06-24 | 2012-01-05 | 주식회사 월시스 | Control method of data management system with emproved security |
US8356046B2 (en) | 2010-09-03 | 2013-01-15 | Sap Ag | Context-based user interface, search, and navigation |
US20120066223A1 (en) | 2010-09-13 | 2012-03-15 | Openpeak Inc. | Method and computing device for creating distinct user spaces |
EP3920465B1 (en) | 2010-10-08 | 2023-12-06 | Brian Lee Moffat | Private data sharing system |
WO2012057942A1 (en) | 2010-10-27 | 2012-05-03 | High Cloud Security, Inc. | System and method for secure storage of virtual machines |
US8996863B2 (en) | 2010-12-03 | 2015-03-31 | Yacov Yacobi | Attribute-based access-controlled data-storage system |
US8489643B1 (en) * | 2011-01-26 | 2013-07-16 | Fornova Ltd. | System and method for automated content aggregation using knowledge base construction |
US8863232B1 (en) | 2011-02-04 | 2014-10-14 | hopTo Inc. | System for and methods of controlling user access to applications and/or programs of a computer |
US20120203733A1 (en) | 2011-02-09 | 2012-08-09 | Zhang Amy H | Method and system for personal cloud engine |
GB2488766A (en) | 2011-03-04 | 2012-09-12 | Intercede Ltd | Securely transferring data to a mobile device |
US8661045B2 (en) | 2011-04-04 | 2014-02-25 | Tangome, Inc. | Determining potential relationships between individuals |
CN103493463A (en) | 2011-04-25 | 2014-01-01 | 阿尔卡特朗讯 | Privacy protection in recommendation services |
AU2012261972A1 (en) | 2011-06-01 | 2014-01-09 | Security First Corp. | Systems and methods for secure distributed storage |
US20120323574A1 (en) | 2011-06-17 | 2012-12-20 | Microsoft Corporation | Speech to text medical forms |
US9268758B2 (en) | 2011-07-14 | 2016-02-23 | Docusign, Inc. | Method for associating third party content with online document signing |
US9424439B2 (en) | 2011-09-12 | 2016-08-23 | Microsoft Technology Licensing, Llc | Secure data synchronization |
US8996467B2 (en) | 2011-12-29 | 2015-03-31 | Druva Inc. | Distributed scalable deduplicated data backup system |
US20130205189A1 (en) | 2012-01-25 | 2013-08-08 | Advanced Digital Systems, Inc. | Apparatus And Method For Interacting With An Electronic Form |
US9087212B2 (en) | 2012-01-25 | 2015-07-21 | Massachusetts Institute Of Technology | Methods and apparatus for securing a database |
US20130227352A1 (en) | 2012-02-24 | 2013-08-29 | Commvault Systems, Inc. | Log monitoring |
GB201203558D0 (en) | 2012-02-29 | 2012-04-11 | Qando Service Inc | Delivering data over a network |
US9514462B2 (en) | 2012-03-02 | 2016-12-06 | Google Inc. | Obtaining and managing access to content |
KR101318170B1 (en) | 2012-03-23 | 2013-10-15 | 주식회사 우리은행 | data sharing system using a tablets apparatus and controlling method therefor |
US8291500B1 (en) | 2012-03-29 | 2012-10-16 | Cyber Engineering Services, Inc. | Systems and methods for automated malware artifact retrieval and analysis |
US8793466B2 (en) | 2012-04-27 | 2014-07-29 | Netapp, Inc. | Efficient data object storage and retrieval |
US8898376B2 (en) | 2012-06-04 | 2014-11-25 | Fusion-Io, Inc. | Apparatus, system, and method for grouping data stored on an array of solid-state storage elements |
US20130332804A1 (en) | 2012-06-06 | 2013-12-12 | Conrad Delbert Seaman | Methods and devices for data entry |
US9959423B2 (en) | 2012-07-30 | 2018-05-01 | Microsoft Technology Licensing, Llc | Security and data isolation for tenants in a business data system |
US9203926B2 (en) * | 2012-09-17 | 2015-12-01 | Dropbox, Inc. | System and method of creating unique profiles on a social networking site |
US9288056B1 (en) | 2015-05-28 | 2016-03-15 | Pearson Education, Inc. | Data access and anonymity management |
US20140122988A1 (en) | 2012-10-30 | 2014-05-01 | FHOOSH, Inc. | Systems and methods for populating user information on electronic forms |
US9836795B2 (en) * | 2012-11-08 | 2017-12-05 | Hartford Fire Insurance Company | Computerized system and method for pre-filling of insurance data using third party sources |
US20140149470A1 (en) | 2012-11-27 | 2014-05-29 | Sandeep Rawal | Systems and methods for storing and populating forms |
US9225696B2 (en) | 2012-12-19 | 2015-12-29 | Stmicroelectronics S.R.L. | Method for different users to securely access their respective partitioned data in an electronic apparatus |
US8904503B2 (en) | 2013-01-15 | 2014-12-02 | Symantec Corporation | Systems and methods for providing access to data accounts within user profiles via cloud-based storage services |
KR101441581B1 (en) | 2013-01-15 | 2014-09-25 | 경희대학교 산학협력단 | Multi-layer security apparatus and multi-layer security method for cloud computing environment |
US9245137B2 (en) | 2013-03-04 | 2016-01-26 | International Business Machines Corporation | Management of digital information |
US9367646B2 (en) | 2013-03-14 | 2016-06-14 | Appsense Limited | Document and user metadata storage |
WO2014145730A2 (en) * | 2013-03-15 | 2014-09-18 | United Parcel Service Of America, Inc. | Portable address book systems and related methods |
US9098687B2 (en) | 2013-05-03 | 2015-08-04 | Citrix Systems, Inc. | User and device authentication in enterprise systems |
US9158927B1 (en) | 2013-06-24 | 2015-10-13 | Amazon Technologies, Inc. | Cross-region recovery of encrypted, erasure-encoded data |
US9436842B2 (en) | 2013-08-16 | 2016-09-06 | Vinay Purohit | Distributed fragments file system |
GB2514428B (en) | 2013-08-19 | 2016-01-13 | Visa Europe Ltd | Enabling access to data |
WO2015066537A1 (en) | 2013-10-31 | 2015-05-07 | Eco-Mail Development, Llc | System and method for secured content delivery |
US9556008B2 (en) | 2013-11-05 | 2017-01-31 | Everett Ogden | Winch with drum-encased brushless DC motor |
KR101520722B1 (en) | 2014-01-17 | 2015-05-21 | 크루셜텍 (주) | Method, server and user device for verifying user |
ES2760627T3 (en) | 2014-04-10 | 2020-05-14 | Atomizer Group Llc | Procedure and system to secure the data |
US9654463B2 (en) | 2014-05-20 | 2017-05-16 | Airwatch Llc | Application specific certificate management |
RU2589861C2 (en) | 2014-06-20 | 2016-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of user data encryption |
US11120442B2 (en) | 2014-06-20 | 2021-09-14 | Apple Inc. | Management of reloadable credentials on an electronic device using an online resource |
US9672336B1 (en) | 2014-08-29 | 2017-06-06 | ProfileCorrect LLC | Security system for verification of user credentials |
EP3198512A4 (en) | 2014-09-23 | 2018-05-09 | Fhoosh Inc. | Secure high speed data storage, access, recovery, and transmission |
EP3234856B1 (en) | 2014-12-15 | 2020-07-15 | Ubiq Security, Inc. | Method for diffracted data retrieval |
US9455963B1 (en) | 2014-12-18 | 2016-09-27 | Amazon Technologies, Inc. | Long term encrypted storage and key management |
US9292699B1 (en) | 2014-12-30 | 2016-03-22 | Airwatch Llc | Encrypted file storage |
US9210187B1 (en) | 2015-01-13 | 2015-12-08 | Centri Technology, Inc. | Transparent denial of service protection |
US10692085B2 (en) | 2015-02-13 | 2020-06-23 | Yoti Holding Limited | Secure electronic payment |
US10594484B2 (en) | 2015-02-13 | 2020-03-17 | Yoti Holding Limited | Digital identity system |
JP2017073074A (en) | 2015-10-09 | 2017-04-13 | 株式会社リコー | Information processing apparatus and information processing system |
JP6019514B1 (en) | 2016-01-13 | 2016-11-02 | 株式会社Tcsi | Computer program, secret management method and system |
US20170208052A1 (en) | 2016-01-19 | 2017-07-20 | Hope Bay Technologies, Inc | Hybrid cloud file system and cloud based storage system having such file system therein |
US10298556B2 (en) | 2016-01-20 | 2019-05-21 | FHOOSH, Inc. | Systems and methods for secure storage and management of credentials and encryption keys |
KR20170110420A (en) | 2016-03-23 | 2017-10-11 | 한국전자통신연구원 | Distributed storing method for information document using information protection device |
US10271209B2 (en) | 2016-06-12 | 2019-04-23 | Apple Inc. | Session protocol for backward security between paired devices |
AU2017332645B2 (en) | 2016-09-23 | 2019-12-19 | Apple Inc. | Managing credentials of multiple users on an electronic device |
-
2013
- 2013-10-23 US US14/061,740 patent/US20140122988A1/en not_active Abandoned
- 2013-10-23 US US14/061,735 patent/US9639597B2/en active Active
- 2013-10-23 US US14/061,734 patent/US10146850B2/en active Active
- 2013-10-23 US US14/061,743 patent/US10614099B2/en active Active
- 2013-10-23 US US14/061,736 patent/US9665638B2/en active Active
- 2013-10-23 US US14/061,748 patent/US10635692B2/en active Active
- 2013-10-30 EP EP13850795.9A patent/EP2915065A4/en not_active Ceased
- 2013-10-30 CA CA2889996A patent/CA2889996C/en active Active
- 2013-10-30 WO PCT/US2013/067610 patent/WO2014070950A1/en active Application Filing
-
2017
- 2017-05-25 US US15/605,860 patent/US10372733B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5563998A (en) * | 1990-10-19 | 1996-10-08 | Moore Business Forms, Inc. | Forms automation system implementation |
US6247029B1 (en) * | 1998-05-01 | 2001-06-12 | International Business Machines Corporation | Web browser form enhancements |
US6820204B1 (en) * | 1999-03-31 | 2004-11-16 | Nimesh Desai | System and method for selective information exchange |
US6651217B1 (en) * | 1999-09-01 | 2003-11-18 | Microsoft Corporation | System and method for populating forms with previously used data values |
US20030028792A1 (en) * | 2001-08-02 | 2003-02-06 | International Business Machines Corportion | System, method, and computer program product for automatically inputting user data into internet based electronic forms |
US7343551B1 (en) * | 2002-11-27 | 2008-03-11 | Adobe Systems Incorporated | Autocompleting form fields based on previously entered values |
US7779345B2 (en) * | 2003-07-30 | 2010-08-17 | Aol Inc. | Reverse mapping method and apparatus for form filling |
US20070033118A1 (en) * | 2005-08-02 | 2007-02-08 | Taxscan Technologies, Llc | Document Scanning and Data Derivation Architecture. |
US20080120257A1 (en) * | 2006-11-20 | 2008-05-22 | Yahoo! Inc. | Automatic online form filling using semantic inference |
Non-Patent Citations (1)
Title |
---|
Amihai Motro and Francesco Parisi-Presicce, "Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption," Data and Applications Security XIX, copyright 2005, pages 338-352 * |
Cited By (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10254929B2 (en) | 2011-08-25 | 2019-04-09 | Vmware, Inc. | User interface virtualization techniques |
US11238451B1 (en) | 2011-11-22 | 2022-02-01 | Square, Inc. | Authorization of cardless payment transactions |
US10614099B2 (en) | 2012-10-30 | 2020-04-07 | Ubiq Security, Inc. | Human interactions for populating user information on electronic forms |
US10635692B2 (en) | 2012-10-30 | 2020-04-28 | Ubiq Security, Inc. | Systems and methods for tracking, reporting, submitting and completing information forms and reports |
US10546046B2 (en) * | 2013-03-14 | 2020-01-28 | Goformz, Inc. | System and method for converting paper forms to an electronic format |
US20150050631A1 (en) * | 2013-08-13 | 2015-02-19 | College Zoom, Inc. | College application tutorial systems and methods |
US10621276B2 (en) | 2013-10-24 | 2020-04-14 | Wmware, Inc. | User interface virtualization for web applications |
US20160275063A1 (en) * | 2013-10-24 | 2016-09-22 | Vmware, Inc. | Transforming html forms into mobile native forms |
US9772986B2 (en) * | 2013-10-24 | 2017-09-26 | Vmware, Inc. | Transforming HTML forms into mobile native forms |
US20150205777A1 (en) * | 2014-01-23 | 2015-07-23 | Xerox Corporation | Automated form fill-in via form retrieval |
US9785627B2 (en) * | 2014-01-23 | 2017-10-10 | Xerox Corporation | Automated form fill-in via form retrieval |
US11202200B2 (en) * | 2014-01-29 | 2021-12-14 | Capital One Services, Llc | Systems and methods for populating online applications using third party platforms |
US20230379697A1 (en) * | 2014-01-29 | 2023-11-23 | Capital One Services, Llc | Systems and methods for populating online applications using third party platforms |
US11729611B2 (en) * | 2014-01-29 | 2023-08-15 | Capital One Services, Llc | Systems and methods for populating online applications using third party platforms |
US20220095103A1 (en) * | 2014-01-29 | 2022-03-24 | Capital One Services, Llc | Systems and methods for populating online applications using third party platforms |
US10133718B2 (en) | 2014-07-18 | 2018-11-20 | FHOOSH, Inc. | Systems and methods for locating, identifying and mapping electronic form fields |
WO2016011456A1 (en) * | 2014-07-18 | 2016-01-21 | FHOOSH, Inc. | Systems and methods for locating, identifying and mapping electronic form fields |
US11354673B1 (en) * | 2014-08-06 | 2022-06-07 | Block, Inc. | Data security enhancement for online transactions involving payment card accounts |
US10579823B2 (en) | 2014-09-23 | 2020-03-03 | Ubiq Security, Inc. | Systems and methods for secure high speed data generation and access |
US10572682B2 (en) | 2014-09-23 | 2020-02-25 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, and transmission of an obfuscated data locator |
US10657284B2 (en) | 2014-09-23 | 2020-05-19 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, and transmission |
US10657283B2 (en) | 2014-09-23 | 2020-05-19 | Ubiq Security, Inc. | Secure high speed data storage, access, recovery, transmission, and retrieval from one or more of a plurality of physical storage locations |
US10489377B2 (en) | 2015-02-11 | 2019-11-26 | Best Collect, S.A. De C.V. | Automated intelligent data scraping and verification |
US11188519B2 (en) | 2015-02-11 | 2021-11-30 | Best Collect, S.A. De C.V., Mexico | Automated intelligent data scraping and verification |
US20160253303A1 (en) * | 2015-02-27 | 2016-09-01 | Hrb Innovations, Inc. | Digital processing and completion of form documents |
US10936636B2 (en) * | 2016-07-07 | 2021-03-02 | Advanced New Technologies Co., Ltd. | Collecting user information from computer systems |
US20180011928A1 (en) * | 2016-07-07 | 2018-01-11 | Alibaba Group Holding Limited | Collecting user information from computer systems |
WO2018013357A1 (en) * | 2016-07-15 | 2018-01-18 | Intuit Inc. | Machine learning of context of data fields for various document types |
US11520975B2 (en) | 2016-07-15 | 2022-12-06 | Intuit Inc. | Lean parsing: a natural language processing system and method for parsing domain-specific languages |
US11663495B2 (en) | 2016-07-15 | 2023-05-30 | Intuit Inc. | System and method for automatic learning of functions |
US11049190B2 (en) | 2016-07-15 | 2021-06-29 | Intuit Inc. | System and method for automatically generating calculations for fields in compliance forms |
US10725896B2 (en) | 2016-07-15 | 2020-07-28 | Intuit Inc. | System and method for identifying a subset of total historical users of a document preparation system to represent a full set of test scenarios based on code coverage |
US11663677B2 (en) | 2016-07-15 | 2023-05-30 | Intuit Inc. | System and method for automatically generating calculations for fields in compliance forms |
US10579721B2 (en) | 2016-07-15 | 2020-03-03 | Intuit Inc. | Lean parsing: a natural language processing system and method for parsing domain-specific languages |
US10140277B2 (en) | 2016-07-15 | 2018-11-27 | Intuit Inc. | System and method for selecting data sample groups for machine learning of context of data fields for various document types and/or for test data generation for quality assurance systems |
US11222266B2 (en) | 2016-07-15 | 2022-01-11 | Intuit Inc. | System and method for automatic learning of functions |
US11437056B1 (en) | 2016-07-28 | 2022-09-06 | United Services Automobile Association (Usaa) | Vehicle sound analysis |
US10629224B1 (en) * | 2016-07-28 | 2020-04-21 | United Services Automobile Association (Usaa) | Vehicle sound analysis |
US10748130B2 (en) | 2016-09-30 | 2020-08-18 | Square, Inc. | Sensor-enabled activation of payment instruments |
US11455858B2 (en) | 2016-09-30 | 2022-09-27 | Block, Inc. | Payment application initiated generation of payment instruments |
USD954145S1 (en) | 2016-11-30 | 2022-06-07 | Block, Inc. | Payment card |
US10599761B2 (en) * | 2017-09-07 | 2020-03-24 | Qualtrics, Llc | Digitally converting physical document forms to electronic surveys |
CN108229174A (en) * | 2017-12-28 | 2018-06-29 | 陕西山利科技发展有限责任公司 | Security risk management system and management method based on cloud data |
US11349656B2 (en) | 2018-03-08 | 2022-05-31 | Ubiq Security, Inc. | Systems and methods for secure storage and transmission of a data stream |
USD904450S1 (en) | 2018-04-27 | 2020-12-08 | Square, Inc. | Portion of a display screen with graphical user interface for option selection |
US10990751B2 (en) * | 2018-11-28 | 2021-04-27 | Citrix Systems, Inc. | Form template matching to populate forms displayed by client devices |
US20200167413A1 (en) * | 2018-11-28 | 2020-05-28 | Citrix Systems, Inc. | Form template matching to populate forms displayed by client devices |
US11487934B2 (en) | 2018-11-28 | 2022-11-01 | Citrix Systems, Inc. | Form template matching to populate forms displayed by client devices |
US10748135B2 (en) | 2018-11-30 | 2020-08-18 | Square, Inc. | Offline onboarding of trackable transaction instrument with associated profile |
US11315108B2 (en) | 2018-11-30 | 2022-04-26 | Block, Inc. | Profile generation and association with multiple transaction cards contemporaneously |
US11748380B1 (en) * | 2019-03-08 | 2023-09-05 | United Services Automobile Association (Usaa) | Aggregated application data store |
US11163956B1 (en) | 2019-05-23 | 2021-11-02 | Intuit Inc. | System and method for recognizing domain specific named entities using domain specific word embeddings |
US11687721B2 (en) | 2019-05-23 | 2023-06-27 | Intuit Inc. | System and method for recognizing domain specific named entities using domain specific word embeddings |
US10798089B1 (en) * | 2019-06-11 | 2020-10-06 | Capital One Services, Llc | System and method for capturing information |
US11621951B2 (en) | 2019-06-11 | 2023-04-04 | Capital One Services, Llc | System and method for capturing information |
US11184349B2 (en) | 2019-06-11 | 2021-11-23 | Capital One Services, Llc | System and method for capturing information |
US11271752B2 (en) | 2019-07-29 | 2022-03-08 | International Business Machines Corporation | Automatic form completion from a set of federated data providers |
US11783128B2 (en) | 2020-02-19 | 2023-10-10 | Intuit Inc. | Financial document text conversion to computer readable operations |
WO2021249489A1 (en) * | 2020-06-12 | 2021-12-16 | 支付宝(杭州)信息技术有限公司 | Identity profile processing |
US11388308B2 (en) * | 2020-09-15 | 2022-07-12 | Xerox Corporation | Creating label form templates |
Also Published As
Publication number | Publication date |
---|---|
US20170262525A1 (en) | 2017-09-14 |
CA2889996C (en) | 2020-12-08 |
US10635692B2 (en) | 2020-04-28 |
EP2915065A1 (en) | 2015-09-09 |
CA2889996A1 (en) | 2014-05-08 |
US20140122989A1 (en) | 2014-05-01 |
US20140122497A1 (en) | 2014-05-01 |
US9639597B2 (en) | 2017-05-02 |
US20140122987A1 (en) | 2014-05-01 |
US10372733B2 (en) | 2019-08-06 |
WO2014070950A1 (en) | 2014-05-08 |
EP2915065A4 (en) | 2016-06-22 |
US20140122508A1 (en) | 2014-05-01 |
US10614099B2 (en) | 2020-04-07 |
US9665638B2 (en) | 2017-05-30 |
US10146850B2 (en) | 2018-12-04 |
US20140123057A1 (en) | 2014-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10372733B2 (en) | Systems and methods for secure storage of user information in a user profile | |
US10678945B2 (en) | Consent receipt management systems and related methods | |
US20190180054A1 (en) | Consent receipt management systems and related methods | |
US10430608B2 (en) | Systems and methods of automated compliance with data privacy laws | |
US9563918B2 (en) | Systems and methods for display and interaction on a graphical user interface | |
US11720803B2 (en) | Computer-implemented, user-controlled method of automatically organizing, storing, and sharing personal information | |
US20230252553A1 (en) | Systems and methods for managing lists using an information storage and communication system | |
US9037537B2 (en) | Automatic redaction of content for alternate reviewers in document workflow solutions | |
US20090144188A1 (en) | Apparatus, system and computer program product for a paperless credit application process | |
US11625682B2 (en) | Persona-based application platform | |
CA3136132A1 (en) | Record reporting system | |
US20150331567A1 (en) | Interaction/resource network data management platform | |
US20230267371A1 (en) | Apparatus, method and computer program for generating de-identified training data for conversational service | |
US20180197160A1 (en) | Dashboard patient self service product enhancement | |
JP5963998B1 (en) | Credit office management system and method | |
US11663272B2 (en) | Custom data filtering systems and methods | |
WO2023164221A1 (en) | Querying agreement document models in a document management system | |
AU2022283705A1 (en) | Personnel record and match system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FHOOSH, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:EIGNER, LINDA;EIGNER, WILLIAM;TOBIAS, ERIC;AND OTHERS;REEL/FRAME:031911/0428 Effective date: 20131022 |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
AS | Assignment |
Owner name: UBIQ SECURITY, INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:FHOOSH, INC.;REEL/FRAME:049517/0566 Effective date: 20190509 |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |