Method and system for completing forms on wide area networks such as the internet
First Claim
1. A system for complying with requests for information received from a network and directed to a user, said system comprising:
- a data flow monitor interposed between the network and the user that intercepts such requests;
a wallet database where personal information of one or more users is kept in a secure manner and is associated with non-personal identifiers;
a history database containing at least some previously-completed and user-validated requests in which at least some of the personal information is replaced by the non-personal identifiers to at least partly depersonalize the requests;
a request completion system coupled directly or indirectly to the above elements that accepts such requests, that attempts to fulfill such requests using information obtained from the wallet database through the use of history database records of one or more previously completed, validated copies of the same type of request, and also through asking the user to complete all or those portions of requests not automatically completed and to validate all or those portions of requests automatically completed;
said request completion system further including a completed request analysis engine that can add completed, user verified, and at least partly depersonalized requests to the history database.
1 Assignment
0 Petitions
Accused Products
Abstract
A system automatically intercepts and responds to most requests for personal information that are received from a network and directed to a user. Such requests are intercepted, and the sources of the requests, as well as the user, are validated. The system attempts to complete each request, using information obtained from a wallet database where information is kept secure and is associated with non-personal identifiers. The system attempts to complete requests by searching a dictionary database for request-type-specific rules that indicate, by non-personal identifiers, what personal information is to be entered into which fields of each request or form. The system may also attempt to complete requests or forms using rules for other types of requests that are applied to a new type of request using the principles of fuzzy logic or artificial intelligence. The system also includes a history database where previously user-validated requests are kept with personal information replaced with non-personal field identifiers, and it may attempt to complete requests by reference to requests in this history database. After a form is completed either by the system with user validation, or by the user, it may be kept in the history database, and new rules may be derived either through the use of fuzzy logic or artificial intelligence or study of the requests in the history database. These new rules may be added to the dictionary database. The fuzzy logic or artificial intelligence system may also be given positive or negative feedback.
-
Citations
80 Claims
-
1. A system for complying with requests for information received from a network and directed to a user, said system comprising:
-
a data flow monitor interposed between the network and the user that intercepts such requests;
a wallet database where personal information of one or more users is kept in a secure manner and is associated with non-personal identifiers;
a history database containing at least some previously-completed and user-validated requests in which at least some of the personal information is replaced by the non-personal identifiers to at least partly depersonalize the requests;
a request completion system coupled directly or indirectly to the above elements that accepts such requests, that attempts to fulfill such requests using information obtained from the wallet database through the use of history database records of one or more previously completed, validated copies of the same type of request, and also through asking the user to complete all or those portions of requests not automatically completed and to validate all or those portions of requests automatically completed;
said request completion system further including a completed request analysis engine that can add completed, user verified, and at least partly depersonalized requests to the history database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 70, 71, 72, 73, 74)
-
-
12. A method for automatically complying with requests for information received from a network and directed to a user comprising the steps of:
-
establishing a wallet database where user information can be kept secure and can be associated with non-personal identifiers;
establishing a history database where user validated, completed requests may be kept with at least some personal information replaced by non-personal identifiers to at least partly depersonalize the requests;
monitoring the flow of data between the network and the user and intercepting such requests for information;
attempting to complete such requests using information obtained from the wallet database through the use of history database records of one or more completed, validated copies of the same type of request, and through asking the user to complete all or those portions of a request not automatically completed and to validate all or those portions of a request automatically completed; and
following user review and validation or completion or correction of a completed request, analyzing any changes made by the user to add completed, user verified, and depersonalized requests to the history data base.
-
-
23. A system for complying with requests for information received from a network and directed to a user, said system comprising:
-
a data flow monitor interposed between the network and the user that intercepts such requests;
a wallet database where personal information of one or more users is kept in a secure manner and is associated with non-personal identifiers;
a history database containing at least some previously-completed and user-validated requests in which at least some of the personal information is replaced by the non-personal identifiers to at least partly depersonalize the requests;
a request completion system coupled directly or indirectly to the above elements that accepts such requests, and that attempts to fulfill such requests using information obtained from the wallet database through the use of history database records of one or more previously completed, validated copies of the same type of request;
said request completion system further including a completed request analysis engine that can add completed and at least partly depersonalized requests to the history database.
-
-
34. A method for automatically complying with requests for information received from a network and directed to a user comprising the steps of:
-
establishing a wallet database where user information can be kept secure and can be associated with non-personal identifiers;
establishing a history database where user validated, completed requests may be kept with at least some personal information replaced by non-personal identifiers to at least partly depersonalize the requests;
monitoring the flow of data between the network and the user and intercepting such requests for information;
attempting to complete such requests using information obtained from the wallet database through the use of history database records of one or more completed, validated copies of the same type of request; and
adding completed and depersonalized requests to the history data base.
-
-
45. A system for complying with requests for information received from a network and directed to a user using personal information obtained from a suitable source, said system comprising:
-
a data flow monitor interposed between the network and the user that intercepts such requests;
a wallet system that, on receipt of a non-personal identifier, can obtain corresponding personal information of one or more users;
a history database containing at least some previously-completed and user-validated requests in which at least some of the personal information is replaced by the non-personal identifiers to at least partly depersonalize the requests;
a request completion system coupled directly or indirectly to the above elements that accepts such requests, that attempts to fulfill such requests using information obtained from the wallet system through the use of history database records of one or more previously completed, validated copies of the same type of request, and also through asking the user to complete all or those portions of requests not automatically completed and to validate all or those portions of requests automatically completed;
said request completion system further including a completed request analysis engine that can add completed, user verified, and at least partly depersonalized requests to the history database.
-
-
56. A method for automatically complying with requests for information received from a network and directed to a user using personal information comprising the steps of:
-
establishing a history database where user validated, completed requests may be kept with at least some personal information replaced by non-personal identifiers to at least partly depersonalize the requests;
monitoring the flow of data between the network and the user and intercepting such requests for information;
attempting to complete such requests using the personal information through the use of history database records of one or more completed, validated copies of the same type of request, and through asking the user to complete all or those portions of a request not automatically completed and to validate all or those portions of a request automatically completed; and
following user review and validation or completion or correction of a completed request, analyzing any changes made by the user to add completed, user verified, and depersonalized requests to the history data base.
-
-
67. A system for automatically complying with requests for information received from a network and directed to a user'"'"'s browser, comprising:
-
a data flow monitor interposed between the network and the user'"'"'s browser that intercepts such requests;
a validation program coupled to the data flow monitor that determines and validates the user'"'"'s identification and that validates the source of the request;
a wallet database where personal information of one or more users is kept in a secure manner and is associated with non-personal identifiers;
a dictionary database containing rules governing what information, identified by non-personal identifiers, goes where in particular types of requests;
a history database containing at least some previously-completed and user-validated requests in which at least some personal information is replaced by the non-personal identifiers to at least partly depersonalize the requests;
a request completion system coupled directly or indirectly to the above elements that accepts such requests, that attempts to fulfill such requests using information obtained from the wallet database through the use of rules obtained from the dictionary database specifically applicable to that particular type of request, through the use of other rules obtained from the dictionary database applied using fuzzy logic techniques, through the use of history database records of one or more previously completed, validated copies of the same type of request, and through asking the user to complete all or those portions of a request not automatically completed and to validate all or those portions of a request automatically completed;
said request completion system further including a completed request analysis engine that validates new sets of rules developed through fuzzy logic analysis of existing rules or through history database request analysis and through user validation with respect to a particular type of request, that gives positive or negative training feedback to the fuzzy logic system in accordance with its performance as accepted or corrected by users, and that can add completed, user verified, and at least partly depersonalized requests to the history database.
-
-
68. A method for automatically complying with requests for information received from a network and directed to a user comprising the steps of:
-
establishing a wallet database where user information can be kept secure and can be associated with non-personal identifiers;
establishing a history database where at least some previously-completed and user-validated requests may be kept with at least some personal information replaced by non-personal identifiers to at least partly depersonalize the requests;
establishing a dictionary database containing rules associating non-personal identifiers with specific data fields within specific types of requests;
monitoring the flow of all data flowing between the network and the user and intercepting such requests for information;
validating the user'"'"'s identification, and validating the source of the request;
attempting to complete such requests using information obtained from the wallet database through the use of rules obtained from the dictionary database specifically applicable to a particular type of request, through the use of rules obtained from the dictionary database applied using fuzzy logic techniques, through the analysis of history database records of one or more completed, validated copies of the same type of request, and through asking the user to complete all or those portions of a request not automatically completed and to validate all or those portions of a request automatically completed; and
following user review and validation or completion or correction of a completed request, analyzing any changes made by the user to validate any new rules developed through fuzzy logic or history database analysis techniques and adding them to the dictionary database, also to give positive or negative feedback to the fuzzy logic system in accordance with its performance, and also to add completed, user verified, and depersonalized requests to the history database.
-
-
69. A system for completing forms requesting personal information received from a network and directed to a user, said system comprising:
-
a data flow monitor interposed between the network and the user that intercepts such forms;
a history database containing at least some previously-completed forms;
a form fill system coupled directly or indirectly to the above elements that accepts such forms, that attempts to complete such forms using personal information through the use of history database records of one or more previously completed copies of the same form and also through asking the user to complete at least portions of forms not automatically completed;
said data flow monitor intercepting what the user fills in and sending it to the form fill system which writes it to the history database.
-
-
75. A method for automatically filling in forms received from a network and directed to a user with personal information, comprising the steps of:
-
establishing a history database where at least some previously completed forms may be kept;
monitoring the flow of data between the network and the user and intercepting such forms requesting information;
attempting to complete such forms with personal information through the use of history database records of one or more completed copies of the same form, and through asking the user to complete at least some portions of forms not automatically completed;
and intercepting what the user fills in and writing it to the history data base for future use. - View Dependent Claims (76, 77, 78, 79, 80)
-
Specification