Method and apparatus for populating a form with data

ABSTRACT

A method and apparatus for populating a form with data is described. In one embodiment of the invention, a form is displayed to the user via the target application. Each form has one or more data receptacles. The data receptacles of a form are filled with data when the user executes a data population command. The form completion program executes the data population command when a graphical representation of a particular data set is placed over the form. Each data set is stored in an encrypted manner and is accessible to users who enter the appropriate information into an authentication mechanism. To populate a form with data the form completion program obtains an image of the form and then searches for a template file that resembles the form image to within a certain threshold. The template files are typically stored on the computer hosting the target application in a template directory that is arranged according to a predefined structure. The form completion program is configured to search for templates that resemble the form image in the template directory to within a certain threshold.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to computer networks and more particularlyto a method and apparatus for populating a form with data.

2. Background Art

Computer users can shop for merchandise using the Internet. A number ofcompanies maintain web sites where customers can purchase books,records, videos, and many other products. Other web sites providesubscription services that provide the user with access to a service orproduct. Typically, users make purchases or sign up for services bycompleting forms. A problem with current Internet schemes is that eachfield on a form must be filled out separately and manually. This is atime consuming and often frustrating process for the user.

Current systems do not provide a way for users to quickly complete aform (referred to as “populating” a form) with data. For example, when auser wishes to purchase a product online, the user typically supplies acredit card number, a shipping address, and any other personalinformation that may be needed to complete the transaction. The usersupplies this information using an input device such as a keyboard tomanually enter data into the fields of a form. However, after buyinggoods from one vendor, for example, the user may wish to purchase goodsfrom a second vendor. The user must manually complete the secondvendor's form even though the second vendor may require the purchaser toprovide the same kind of information the user provided to the firstvendor. This presents a problem to the user because it forces the userto manually enter the same information into different vendor's formsmultiple times.

Another problem presented by the prior art is that users do not have away to securely store sensitive information and then later use thatinformation to populate a form. Current systems do not provide a way toprevent unauthorized users from obtaining access to sensitiveinformation stored on a user's computer. Instead such systems leave datathat is entered into a form readily accessible. For example, data thatis entered into a form may be stored locally using a technology calledcookies. A cookie is a local representation of information related to aparticular web page that was previously visited by the user. Cookies arenot encrypted and may be read by anyone who can obtain them. The termanyone also includes any computer program that knows where the cookiesare stored. This is problematic because it unnecessarily exposessensitive information to unauthorized users. Therefore, there is a needfor a method and apparatus for populating forms with data where thatdata is accessible only to authenticated users.

The problems associated with form population may be better understood bythe following discussion of the Internet/World Wide Web, web pagecreation, embedded forms, cookies, and web browser technology.

The Internet/World Wide Web

A web browser is a type of computer program that provides users with amechanism for accessing the World Wide Web (WWW). The WWW is a segmentof the Internet comprised of numerous web clients and web servers thatcommunicate with one another using a standard set of protocols. A webserver is a computer configured to provide web pages to the web clientupon request. A web client typically utilizes the web browserapplication to request web pages from the web server.

The Internet is a global computer network comprised of an amalgamationof interconnected networks that are capable of readily communicatingwith one another using a standardized set of protocols. Protocolsprovide a uniform set of communication parameters that enable computersto effectively transmit and receive data. Most computer networks,including the Internet, utilize several different layers of protocols.Each layer provides the network with different functionality.

The WWW is a segment of the Internet that utilizes an application layerprotocol called the HyperText Transfer Protocol (HTTP) to disseminateand to obtain information from users. HTTP is a request/responseprotocol used with distributed, collaborative, hypermedia informationsystems. In operation, HTTP enables one computer to communicate withanother. For example referring now to FIG. 1, web client 100 can useHTTP to communicate with web server 150 via network 125. In thisscenario the web server acts as a repository for files 160 and iscapable of processing the web client's requests for such files. Thefiles 160 stored on the web server may contain any type of data. Forexample, the files may contain data used to construct a form, imagedata, text data, or any other type of data.

HTTP has communication methods that allow web client 100 to request orsend data to web server 150. The web client 100 may use web browser 110to initiate request 115 and receive one or more files from filerepository 160. Typically, web browser 110 sends a request 115 for atleast one file to web server 150 and the web server forwards therequested file to web client 100 in response 120. The connection is thenterminated between web client 100 and web server 150. Web client 100then uses web browser 110 to display the requested file. A clientrequest 115 therefore, consists of establishing a connection between theweb client and the web server using network 125, issuing a response 120to the request 115, and terminating the connection.

Web server 150 does not utilize state information about the request oncethe connection is terminated. HTTP is, therefore, a statelessapplication protocol. That is, a web client can send several requests toa web server, but each individual request is treated independent of anyother request. In some instances, the web server maintains a record ofsuch requests, but the web server does not use that information toprocess later requests. Thus, for example, if a form is completed by theuser and submitted to the web server for processing, the web server maymaintain a record of the data entered into the form, but that recordwill not be used to later influence another request from the sameclient. In other words, web server 150 may record a request in a logfile, but it does not later read from the log to determine how torespond to another request from the same client.

Once a file is sent from web server 150 to web client 100 it becomesready for display. The web client's 100 web browser 110 is typicallyused to format and display files. Web browser 110 allows the user torequest and view a file without having to learn a complicated commandsyntax. Examples of several widely used web browsers include NetscapeNavigator, Internet Explorer, and Opera. Some web browsers can displayseveral different types of files. For example, files written using theHyperText Markup Language (HTML), the JavaScript programming language,the ActiveX programming language, or the Portable Document Format (PDF)may be displayed using a web browser. It is also possible to displayvarious other types of files using language such as Standard GeneralizedMarkup Language (SGML) or eXtensible Markup Language (XML).

Creating a Web Page

A form, which provides one or more places for a user to enter data, canbe embedded inside of a web page. A web page may be created using avariety of different data formats and/or programming languages. Most webpages, and as a result most forms, are created using the HyperTextMarkup Language (HTML). The techniques used to create a web page willnow be discussed in further detail.

HTML is a language that may be used to specify the contents of a webpage (e.g. web page 220). An HTML description is typically comprised ofa set of markup symbols which are described in more detail below. HTMLfile 250 or any type of data file that contains the markup symbols forweb page 220 may be sent to web browser 210. Web browser 210 executingat web client 200 parses the markup symbols in HTML file 250 andproduces web page 220, which is then displayed, based on the informationin HTML file 250. Web page 220 may contain text, pictures, or formscomprised of embedded text fields, checkboxes, or other types of datathat is to be displayed on the web client using web browser 210.Consequently, HTML document 250 defines the web page 220 that isrendered by web browser 210. For example, the following set of markupsymbols directs web browser 210 to display a title, a heading, and animage called “image.jpg”:

<HTML>

<HEAD>

<TITLE> This is a document title </TITLE>

</HEAD>

<BODY>

<H1> This text uses heading level one </Hl>

<IMG SRC=“http://www.idealab.com/image.jpg”>

</BODY>

</HTML>

In the above example, markup symbols (e.g. “<” and “>”) indicate whereeach HTML command (e.g. TITLE) begins and ends. An HTML command, whichis typically surround by markup symbols, provides the web browser withinstructions to execute. Markup symbols typically surround an HTMLcommand. The “<” symbol indicates the start of an HTML command an the“<” symbol indicates the end of an HTML command. Each start or endcommand has a corresponding “>” to indicate the close of that particularcommand. Information associated with the HTML command may be containedwithin the HTML command's start and end symbols. An HTML command is usedby the web browser 210 to determine how to process the block ofinformation associated with the two commands.

In the above example, “<TITLE>”, and “</TITLE>” are examples of HTMLcommands surrounded by markup symbols. The “</TITLE>” HTML commanddirects web browser 210 to place the text “This is a document title” inthe title bar of web browser 210.

Some HTML commands have attribute names associated with the command. Forexample, HTML command “<IMG>”, directs web browser 210 to display animage. A “SRC=” attribute identifies the location and name of the imageto be displayed. In the above example, the statement “<IMGSRC=“http://www.idealab.com/image.jpg“>” tells the web browser todisplay an image named “image.jpg” that can be obtained from the webserver located at “http://www.idealab.com.”

Embedding a Form into a Web Page

An HTML file may also contain HTML commands that cause the web browserto render a web page that contains fields for entering data. The portionof the web page that contains the data entry fields may be referred toas a form (e.g. the portion enclosed in the HTML tags <FORM></FORM>).When the web page is comprised of primarily data entry fields the entireweb page is sometimes also referred to as a form. As is discussed below,HTML includes an HTML form command that may cause the browser to displaydata entry fields. A text box, a drop down menu, a check box, a commandbutton, a toggle button, or any other kind of interface componentcapable of receiving input are some examples of the type of data entryfields that may be placed in a form. Data is manually entered into thefields by the user and then submitted to a web server for processing. Aspreviously discussed, when a user wishes to use a form to purchase aproduct, for example, the user manually fills in text boxes located onthe form with the type of information needed to carry out thetransaction. Other types of data entry fields require the user to selectfrom one or more options such as in the case of a menu, a toggle button,or a radio button, for example. When the form is complete the usersubmits the completed form to the vendor's web server by pressing acommand button, for example.

A problem with collecting information from the user in this manner isthat the user is required to manually enter data into the fields of aform. This takes time and becomes unnecessarily burdensome when the userwishes to complete more than one form with the same information.

FIG. 3 provides an example of, a form created using the HTML definitionlanguage. Code block 310 contains HTML command examples. When a documentcomprising code block 310 is transmitted to web browser 300 executing onweb client 330, it causes form 305 to be displayed. Web browser 300displays form 305 by parsing the HTML commands contained in code block310 and then using the information obtained to format form 305. Once theuser finishes entering information into form 305, the user may submitthe form by pressing command button 331. Pressing command button 331sends the information entered by the user in form 305 to web server 320using the POST method. However, one of ordinary skill in the art couldmodify code block 310 to use the GET method instead of the POST method.

The <FORM>command shown in code block 310 indicates the beginning of aform. Once the initial FORM command is placed into the HTML documentother HTML commands may be entered between the initial FORM command andthe closing FORM command (e.g. </FORM>) that represent, for example, oneor more data entry fields such as a text-box, drop-down lists, checkboxes, radio buttons, and input buttons. The INPUT command is used tospecify different types of data entry fields. The type of data entryfield created is dependant upon the value assigned to the INPUTcommand's TYPE attribute. For example, the INPUT command can create atext-box, a password field, a hidden field, a button, a radio button, ora checkbox. A “text” value assigned to the TYPE attribute of an INPUTcommand creates a text box, for example. Similarly, a TYPE of “checkbox”creates a checkbox. The following code, if inserted after the FORMelement, creates a text box and a checkbox:

<INPUT TYPE=“text” NAME=“user_name”>

<INPUT TYPE=“checkbox” NAME=“user_item1”>

The HTML tags and text contained in code block 310, for example, createform 305 when displayed using web browser 300.

A <FORM>tag may contain an ACTION and/or METHOD attribute. The ACTIONattribute specifies what program on the server to execute when form 305is submitted for processing. The METHOD attribute describes how dataentered into the form is handled. There are two METHOD choices: GET andPOST. Each one of them is capable of processing the data entered into aform. To illustrate, if a user named Bill who resides at 130 West UnionStreet, Pasadena, Calif. 91103 with a credit card number of1111222233334444 completes the Name Address, and Credit Card numberfields shown on form 305 by filling in spaces 345-347, then thefollowing data string 350 is created and sent to web server 320.

user_name=Bill&user_address=130 West Union Street

Pasadena CA 91103&user_cc=1111222233334444

This data string may be handled by either the GET method or the POSTmethod. However, in FIG. 3 it is handled by the POST method. The GETmethod appends information entered into form 305 by the user onto theend of a Uniform Resource Locator (URL 335) or in a QUERY_STRINGenvironment variable. URL 335 is submitted to web server 320 by webclient 330 in an HTTP request 315. Web server 320 is responsible forprocessing the submitted information. A problem with the GET method isthat the information contained in URL 335 is not stored on web client330 for later use and cannot therefore be later used to populate form305. With the POST method, the information placed into form 305 by theuser is placed into the data stream of the HTTP protocol. This allowsweb server 320 to process form 305 data using the standard input datastream to a separate program or script on the server. Standard input isa method for providing a program or script with data that is well knowto programmers skilled in the art. The POST method also does not providea way to store data on web client 330 for later use.

The ACTION attribute of the FORM tag indicates where the computerprogram tasked with processing data string 350 resides. For example, thefollowing portion of code block 310 specifies that a computer program(e.g. a PERL script) named form_processor.pl is located in cgi-bin 321of sever 320.

<FORM METHOD=POST ACTION=http://server320/form_processor.pl>

The form_processor.pl program is responsible for processing data string350. Programs that utilize the Common Gateway Interface (CGI) standardare typically located in a common directory (e.g. cgi-bin 321). CGI is aspecified standard for communicating between HTTP servers andserver-side gateway programs. A CGI program is capable of storing datasupplied by the user, but it cannot determine whether the user askingfor the form is the same user that previously submitted data to the CGIprogram. If the user has never visited the web site before, the CGIprogram does not have any information about that user. CGI programs cancollect information about users who visit a web site, but such programscannot collect information about users who have never visited the website.

The program “form_processor.pl” used in the above example is an exampleof a server-side program that processes data input by the user via form305, for example. When form 305 is submitted web server 320 executes the“form_processor.pl” program and passes the data that was entered by theuser and then sent from web client 330 to server 321. That is, datastring 350 is passed to “form_processor.pl” when a form is submitted.When the gateway program is done processing data string 350 the resultis sent to server 320 and a response may be forwarded back to web client330. Gateway programs can be compiled programs written in languages suchas C or C++ or they can be executable scripts written using a scriptinglanguage such as PERL, TCL, or various other language. Once data string350 is processed it may be stored on server 320 in data store 322. Aproblem with using CGI programs is that since they are located on theserver, information cannot easily be saved on the web client for lateruse.

Thus, existing mechanisms for processing forms reside on the server andare unable to populate a form on the client with user data from usersthat have never visited the web site having the form (e.g. the data isonly available to web servers the user has previously visited).

HTTP Cookies

One example of data that may be stored on the client is a cookie. Acookie is an HTTP header that consists of a text-only string. Thetext-string is entered into the memory of a web client and accessible bythe web browser. This text-string is initially set by the computerserving the web page and consists of the domain name, path, lifetime,and value of a variable that the server sets. If the lifetime of thisvariable is longer than the time the user spends at that site, then thetext-string is saved on the web client for later use. As a result,cookies provide a way to store and later recall values entered into aweb page by the user. For example, cookies allow a web server toindividually customize a web page for each user who visits the page.

A cookie may be used to populate the elements of a form that a user haspreviously completed. For example, referring now to FIG. 9, if a usercompletes field 945-947 of form 905 and submits it to server 920 viasubmission path 915, server 920 can place the data submitted by the userin cookie 931 by sending web client 910 data via path 925. If the userreturns to form 905 again Web browser 930 executing at web client 910may use the data saved in cookie 931 populate fields 945-947 with thedata previously entered by the user. Thus, a cookie can free the userfrom having to complete form 905 more than once. Cookies can be used tofill forms the user has previously visited. However, the data that isstored by the cookie cannot be used to populate other forms. That is, aproblem with cookies is that forms located on different servers are notprovided access to the same cookie. Only web servers that are listed ashaving permission to access a particular cookie may obtain such access.

A cookie is only accessible to the server that set, or created it. Thus,a second form cannot use the first form's cookies to obtain the user'sname and address. For example, the web server located atwww.merchantA.com may be allowed to read a cookie, but the web serverlocated at www.merchantB.com may not be allowed to read the cookiecreated by www.merchantA.com

Referring now to FIG. 4, the process used to create and retrieve acookie is illustrated. Initially, web browser 401 which resides on webclient 400 issues a request 410 for web page 415 from web server 450.Web server 450 responds by sending a copy of web page 415 to web client400 via response 411. Web client 400 uses web browser 401 to display webpage 415 to the user. To create a cookie 460, web server 450 sends a“Set-Cookie” command in the header line contained in response 411. Forexample, in response to a request 410, web server 450 may send thefollowing command in HTTP response 411:

Set-Cookie: NAME=VALUE; expires=DATE; path=PATH; domain=DOMAIN_NAME;secure.

The NAME and VALUE parameter contain the information included in thecookie. DATE is the time at which the cookie expires and is thus nolonger saved on web client 210. DOMAIN is the host address or domainname for which the cookie is valid. For example, if a cookie is set by acomputer having a domain name of www.merchantA.com, only the serverresponsible for that particular domain name is provided access to thecookie. The PATH parameter specifies a subset of URL's at theappropriate domain for which the cookie is valid. If the keyword secureis used then the cookie is only transmitted over a secure connection.All of these parameters except the NAME=VALUE are optional to set acookie. Once the Set-Cookie command is sent to web client 400 a cookie460 is placed on web client 400.

To create a cookie 460 using the UNIX operating system, for example, webserver 450 could execute the following shell script in response to arequest 410:

#!/bin/sh

echo Content-type: text/html

echo Set-cookie: FooBar=foo; expires=Wednesday, 02-11-99 12:00:00 GMT

echo

echo <H1>A Cookie named Foobar containing the text foo is now present onyour computer</H>

This script stores “FooBar=foo” on web client 400. The following scriptallows web server 450 to read the HTTP cookie:

#!/bin/sh

echo Content-type: text/html

echo

echo The data supplied here was obtained from a cookie:<P>

echo $HTTP_COOKIE

Once cookie 460 is created, the information stored in the cookie can beused in many different ways. Information in cookie 460 may be accessedby a script that has authorization to insert cookie 460 data into aform, for example. However, a problem with cookies that noauthentication mechanism is required to obtain the information theystore. A cookie is a text file and is not stored in encrypted form.While a browser may limit access to a cookie, the text that is stored inthe cookie may be accessed or read by any program that can read a textfile. Therefore, it is not wise to store any sensitive data in a cookie.An additional problem with cookies is that users do not have to enter auser name and password to obtain access to the cookie.

Predefined Paste Operation

Some web browsers provide users with a mechanism for pasting predefineddata into a form. Under the generic preferences menu of the Opera webbrowser, for example, the user can select a command button labeledpersonal information. When this command button is selected a dialog boxthat contains fields for entering personal information opens. If theuser desires, the user can enter a name, an address, a phone number, ane-mail address, and/or any other kind of information into the textfields of the dialog box.

Once the user enters information into the fields of the dialog box andclicks “OK” the information that was entered can be pasted into thefields of a form by performing a right click operation. For example, ifthe user encounters a form that has a place for entering an address, theuser can elect to paste the address previously specified in the dialogbox by first selecting the address field and then right-clicking on apointing device such as a mouse and selecting from a drop down menu theitem titled “insert address”.

A problem with pasting information into the fields of a form in thismanner is that the user is required to manually select the place toinsert the information and the type of information to insert into thatplace. Another problem is that unauthorized users are not prevented fromaccessing the information entered into the dialog box.

SUMMARY OF THE INVENTION

A method and apparatus for populating a form with data is described. Oneembodiment of the present invention executes on a web client that isconnected to a computer network such as the Internet. The web client iscapable of obtaining web pages that contain forms from the Internet. Theweb client contains computer code, such as a form completion program,configured to enable a user to populate a form with data. The formcompletion program interacts with a target application (e.g. a webbrowser) installed at the web client to provide the user with amechanism for filling out multiple forms. The form completion program,for example, provides the user with a mechanism to complete a form bydragging a graphical representation of a data set over to the form andthen dropping it.

In one embodiment of the invention, a form is displayed to the user viathe target application. Each form has one or more data receptacles. Thedata receptacles of a form are filled with data when the user executes adata population command. The form completion program executes the datapopulation command when a graphical representation of a particular dataset is placed over the form. The form completion program collects datafrom the user via a data collection interface. The data collectioninterface provides data entry fields for the user to enter a particulartype of information (e.g. a data set). Each data set that is enteredusing the data collection interface is stored in an encrypted manner andis accessible to users who enter the appropriate information into anauthentication mechanism.

To populate a form with data the form completion program obtains animage of the form and then searches for a template file that resemblesthe form image to within a certain threshold. The template files aretypically stored on the computer hosting the target application in atemplate directory that is arranged according to a predefined structure.The form completion program is configured to search for templates thatresemble the form image in the template directory to within a certainthreshold. However, the invention also contemplates searching fortemplates at alternate locations. Templates, for example, may reside onany other computer that is accessible via a telecommunication mediumsuch as a computer network.

The form completion program examines each template file in order todetermine if one or more of the template files resembles the form imageto within a certain threshold. If a template file that resembles theform image to within a certain threshold is located, then the formcompletion acknowledges that a match occurred. When a match occurs theform completion program utilizes the template file to identify what kindof data to insert into each of the form's data receptacles. For example,the template file allows the form completion program to determine whichof the data receptacles contain personal information and which datareceptacles contain payment information. Once the form completionprogram successfully identifies what kind of data to insert into eachdata receptacle the program begins to input the appropriate kind of datainto the appropriate data receptacle.

The present invention contemplates the use of multiple techniques toinsert information into the data receptacles. The technique used islargely dependent upon the type of target application used to displaythe form.

DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of the various components used by the WorldWide Web.

FIG. 2 is a block diagram illustrating the components used to create aweb page.

FIG. 3 is a block diagram illustrating how web client interacts with aweb server to display a form.

FIG. 4 illustrates the process used to create and retrieve a cookie.

FIG. 5 is an illustration of the process used by one embodiment of theinvention to populate a form.

FIG. 6 illustrates some of the actions the form completion programlistens for when it is in the listening mode.

FIG. 7 is an example of several of the interfaces presented to the userby the form completion program.

FIG. 8 illustrates the execution environment of one embodiment of theinvention.

FIG. 9 illustrates the process used by cookies to save form data.

FIG. 10 is a block diagram illustrating how data is collected from theuser in one embodiment of the invention.

FIG. 11 is a block diagram illustrating how the shopping interface usedby one embodiment of the invention interacts with a target application.

DETAILED DESCRIPTION

A method and apparatus for populating a form with data is described. Inthe following description numerous specific details are set forth inorder to provide a more thorough understanding of the present invention.It will be apparent, however, to one skilled in the art, that thepresent invention may be practiced without these specific details. Inother instances, well-known features have not been described in detailso as not to obscure the invention.

One embodiment of the present invention executes on a web client that isconnected to a computer network such as the Internet. The web client iscapable of obtaining forms from the Internet and contains computer codeconfigured to allow a user to populate a form with data. In oneembodiment of the invention, a form completion program is created toexecute the invention.

The form completion program interacts with a target application (e.g. aweb browser) installed at the web client to provide the user with amechanism for filling out multiple forms. The target applicationdisplays forms to the user. The form completion program may havemultiple interfaces that each provide the web client 1015 withadditional functionality. For example, referring now to FIG. 10, a datacollection interface 1000 is shown. The data collection interface 1000may be used to collect and store multiple data sets from multiple users.A data set is a collection of related information (e.g. paymentinformation or personal information) that represents any kind ofinformation likely to be used to complete a form.

In one embodiment of the invention, the data collection interfacecollects a data set via a data collection form 1005. Data entered intothe data collection fields 1006-1009 of the data collection form 1005may be stored in secure storage medium 1010. The data stored in storagemedium 1010 is utilized to populate a form when the user issues a formpopulation command. The data held in secure storage medium 1010 may beencrypted and reside on web client 1015 and/or any other computationaldevice available via a network communication medium. A user is notpermitted to access secure storage medium 1010 until properlyauthenticated.

Each data set stored in secure storage medium 1020, may be associatedwith a graphical representation 1120. Referring now to FIG. 11, forexample, a data set comprising payment information may be represented bya credit card graphic. A data set comprising personal information may berepresented by an identification card graphic. A data set may beassociated with any type of graphic. In one embodiment of the invention,the graphical representations of each data set are displayed to the uservia a shopping interface 1125. The shopping interface may be used toexecute a form population command. When executed, a form populationcommand completes form 1135. Form 1135 is displayed via a targetapplication 1103 such as a web browser or other computer program.

The form completion program executes the data population command when agraphical representation 1120 is moved from the shopping interface 1120to form 1135. The data population command fills data receptacles1136-1139 with data taken from secure storage medium 1010. For example,if the user encounters a form 1135 that prompts the user for personalinformation (e.g. name, address, and phone number), then the user couldprovide that information to form 1135 by dragging a graphic (e.g.graphic 1120) that represents the user's personal information from formcompletion program to form 1135. When the user drops the graphicalrepresentation 1120 of the information onto the form 1135, the datapopulation command places data into the appropriate place of the form byobtain the data from secure storage medium 1010, identifying what typeof form 1135 is to be populated, and then using this information to fillthe fields 1136-1139 of form 1135 with data. In one embodiment of theinvention, the type of form 1135 that is to be populated is identifiedby a template file. However, the manner with which a form is populatedis dependent upon the type of form that is being populated.

The form completion program, for example, provides the user with amechanism to complete a form by dragging a graphical representation of adata set over to the form and then dropping it. Anytime the userencounters a form the user may elect to populate the form by performingthis drag and drop operation.

In one embodiment of the invention, the data receptacles of a form arefilled with data when the user executes a data population command.

Creating a Form

A form may be created using HTML or any other programming languagecapable of generating a document that provides a place for the user toenter data (e.g. a data receptacle). For example, a spreadsheet, a wordprocessing document, a document created using PDF, a database table, orany other type of document having one or more data receptacles may bereferred to as a form. A data receptacle is a field or place for holdingand/or receiving data.

Data Population Command

In one embodiment of the invention, the data population command isexecuted by a form completion program. The form completion program maybe configured to collect data from the user and execute a datapopulation command when the user performs a drag and drop operation.Other types of computer programs, however, may also collect data fromthe user and perform a data population command. For example, anoperating system, a dynamic link library, a Java applet, or any othertype of executable computer program may be configured to execute a datapopulation command.

The form completion program aids in the process of collecting data fromthe user by prompting the user for information likely to be required tocomplete a form. For example, the user might be prompted to enterpersonal information (e.g. name, address, phone number, etc . . . ) andpayment information (e.g. American Express number, Visa card number,MasterCard number). Once information is gathered, the form completionprogram creates a graphic that is representative of the type ofinformation collected. For example, if the user provides the formcompletion program with payment information such as a Visa Card orMasterCard number, then a graphic is created that represents the form ofpayment information the user supplied. For example, an icon depicting aVisa Card, MasterCard or other such card might be displayed. If the userprovides personal information, such as a name and address, then agraphic is created that identifies the data associated with thatparticular personal information. For example, an image resembling adrivers license or identification card might be displayed. Eachgraphical representation that is created is associated with a differentdata set. The user may elect to create additional data sets that have acorresponding graphical representation. The user may customize the typeof data set collected and the graphics associated with that data set. Agraphic may represent any kind of data. The form completion programutilizes the information the user supplies (e.g. the data set) topopulate a form. For example, when a graphic that is representative of aparticular type of data is dragged from the form completion program anddropped on a form the data population command is executed, and the formis completed without requiring more input from the user.

When the user executes the data population command, data is placedinside the data receptacles of the form on which the user executed thedata population command. Multiple data sets/graphics may be used topopulate the same form. For example, a graphic representative of acredit card may be used to populate the form with credit card data and agraphic representative of a user's personal information may be used topopulate the form with personal information.

Various types of data may be placed into each data receptacle. Forexample, executing a data population command may insert text data, imagedata, and/or any other type of data into one or more data receptacles.In one embodiment of the invention, the data utilized to populate theform is supplied by the user and stored on the user's computer beforeexecution of the data population command. However, it is possible toobtain data from other sources. For example, the data population commandmay obtain data from a memory device that is available via acommunication medium such as a computer network. The user executes adata population command by moving a graphical representation of the datafrom a first location to a second location.

Referring now to FIG. 5, an illustration of the process used by oneembodiment of the invention to populate a form is shown. The userinitiates a data population command at step 500 by performing a drag anddrop operation. Once the user issues a data population command the formcompletion program proceeds to step 503 where an attempt is made todetermine what type of target application is displaying the form that isto be populated. For example, the form completion program may determinethat the user is attempting to populate a form displayed using theInternet Explorer web browser. The type of application displaying theform to the user is referred to as the target application.

When the target application type (e.g. Internet Explorer) is determined,then the form completion program proceeds to step 506. At step 506, theform completion program determines whether it recognizes the targetapplication. The form completion program may be configured to support avariety of different target applications.

If the target application is recognized the form completion programproceeds to step 509 where it begins to communicate with the targetapplication in a manner understood by the target application. If thetarget application is not recognized, then a return value is sent, atstep 519, and the form completion program informs the user that thistype of target application is not yet supported. At step 509, the formcompletion program is configured to interact with different targetapplications using a variety of different communication techniques. Aform displayed using Internet Explorer may be dealt with in a differentway than a form displayed using Netscape Communicator (e.g. a differentinterface protocol may be used). The COM interface, for example, is usedto communicate with Internet Explorer 4. However, the present inventionalso contemplates the use of other interfaces and API's such as ActiveXor Javascript. The type of protocol utilized by the form completionprogram is dictated by the target application. The present inventioncontemplates the use of a protocol capable of communicating with thetarget application. It is possible to utilize a variety of differentprotocols to open a communication channel between the form completionprogram and the target application.

Once step 509 is complete, the communication channel between the formcompletion program and the target application is open. This allows theform completion program to proceed to step 511 where it captures thelocation of the form. For example, if the form is displayed using a webbrowser, the form completion program will capture the Uniform ResourceLocator (URL) that identifies where the form is located. The URLprovides the form completion program with the address information neededto determine where the form being populated was obtained. For example,the URL may indicate that the user obtained the form from anothercomputer accessible via a communication medium such as a network. Atstep 513, the form completion program builds an image of the form thetarget application displays to the user. In one embodiment of theinvention, the form completion program builds the form image by queryingthe computer (e.g. the server) that originally supplied the form to thetarget application. However, the form completion program may build aform image by querying any computer that has a version of the form thatis displayed to the user. For example, the form image could be built bycontacting a mirror server instead of the original server. The formcompletion program may also build the form image by querying the targetapplication about its form properties or the form completion program mayelect to utilize a local version of the form that is displayed to theuser. For example, the form completion program may utilize a cachedversion of the form to build a form image. The present inventioncontemplates various techniques for building a form image. It ispossible to utilize any version of the form the user is attempting topopulate in order to build the form image.

Once an image of the form the user is attempting to populate isproduced, the form completion program proceeds to step 515 where itsearches for a template file that resembles the form image. The templatefile comprises a collection of form descriptions. In one aspect of theinvention, the template file is a text file that contains one or moreform descriptions. Each form description is typically associated with aparticular form. However, one description may represent multiple formsif the forms are substantially similar to one another. Each formdescription in the template file is associated with a regular expressionand a list of controls. Each control has an index, a symbol, and acontrol type description.

The index associates a number with each control that resides on a form.For example, if a form contains a button control and a select boxcontrol the template file may identify information about each of thesecontrols by associating the number zero with the button control and thenumber one with the select box control. The template file may alsocontain a plain text name for each control. In one embodiment of theinvention, each control is associated with a symbol. The symbolrepresents the data that is to be placed inside the fields of the form.For example, the symbol can represent a name, date, or gender. Eachcontrol also has a control type description that identifies what type ofcontrol is present. The control type description, for example, may beutilized by the form completion program to determine what steps arerequired to populate the control with data. The way a text box isfilled, for example, may be different from the way a check box iscompleted. A text box may accept raw textual data whereas a check boxmay accept a Boolean value.

In one embodiment of the invention, each form in the template file has aregular expression associated with it. The regular expression describesa set of one or more forms that a particular template file resembles(e.g. by using a string of text, such as a URL, that is contained withina form) and thereby provides information that may be used to perform astring matching operation. String matching provides the form completionprogram with a way to determine whether the template file resembles aform to within a certain threshold. For example, if the URL of a formcontains a word that starts with W followed by a period and three moreletters, this information can be stored in the regular expression andused to verify that the correct template file is being used to completethe form.

If the form completion program attempts to complete a form that is notrepresented in the template file, a list of the data that was collectedfrom the user is displayed. When the list is displayed, the user mayelect to manually intervene by dragging information from the list ontothe form. If, for example, the user wishes to place address informationinto one of the data receptacles contained on a form, the user can dragthe address data from the list to the form. At this point, theinformation placed over the form is inserted into the appropriate datareceptacle. The user may repeat this process to fill-in the remainingdata receptacles. In one embodiment of the invention, the actions of theuser may be used to generate a form description. For example, if a usermanually completes a form, the form completion program may track theinformation the user elected to place in the forms various datareceptacles. This information may then be transmitted to a third partyfor verification and utilized to generate a new form description for thetemplate file. In one embodiment of the invention, a different templatefile is created for each form. However, a single template file mayrepresent more than one form. For example, a generic template thatoperates on forms that adhere to a set of predefined standards may becreated and later verified by an independent party. The template maystore information using a variety of formats such as binary,hexadecimal, or text (e.g. ASCII or XML). It is also possible to useother methods for representing information. A template file, forexample, may be an executable file, a compressed file, and/or any otherform of storing digital information. For example, a template file may beincluded in the form (using ECML, inband tems).

The template files are typically stored on the computer hosting thetarget application in a template directory. The form completion programis configured to search for templates that resemble the form image inthe template directory to within a certain threshold. However, theinvention also contemplates searching for templates at alternatelocations. Templates, for example, may reside on any other computer thatis accessible via a telecommunication medium such as a computer network.

The form completion program examines each template file in order todetermine if one or more of the template files resembles the form imageto within a certain threshold. For example, if a percentage of thetemplate file is similar to the form image then the form completionprogram may assume that a match occurred. In one embodiment of theinvention, the threshold percentage is thirty percent. However, thepresent invention contemplates the use of any percentage indicative of amatch. For example, in some instances a threshold percentage lower thanthirty percent indicates a match whereas in other instances a percentagegreater than thirty percent indicates a match. The percentage chosen islargely a result of how much the form has changed since the templatefile was created. If, for example, a form has added new graphics, buthas substantially the same text as when the template was created, thenthe template file will resemble the form image to a greater percent thanit would if the text or number of data receptacles on the form werechanged.

If a template file that resembles the form image to within a certainthreshold is located, then the form completion program proceeds to step517 where it acknowledges that a match occurred. If no match is foundthe form completion program informs the user that the data populationcommand was not successfully completed. At this point the program mayexecute step 519 and exit. Otherwise, the form completion programexecutes step 518 where the information obtained from the template fileis utilized to populate the form.

The form completion program utilizes the template file to identify whatkind of data to insert into each of the form's data receptacles. Forexample, the template file allows the form completion program todetermine which of the data receptacles contain personal information andwhich data receptacles contain payment information. Once the formcompletion program successfully identifies what kind of data to insertinto each data receptacle the program begins to input the appropriatekind of data into the appropriate data receptacle. The user's name, forexample, is placed in all data receptacles that expect such informationand the user's credit card number is placed in all data receptacles thatexpect credit card information.

The present invention contemplates the use of multiple techniques toinsert information into the data receptacles. The technique used islargely dependent upon the type of target application used to displaythe form. If, for example, the form is displayed using the InternetExplorer web browser the form completion program populates the datareceptacles by sending a command to the browser that tells the browserwhich string belongs in which data receptacle (e.g. insert name intodata receptacle 1). If the form is displayed with the Netscape webbrowser, the technique for inserting information into the datareceptacles differs. When Netscape is used, data is inserted by grabbingstandard input and emulating keystrokes. Each keystroke inserts acharacter of information into the appropriate data receptacle. To movefrom one data receptacle to the next the set focus system message issent (WM_SETFOCUS). However, the invention contemplates using othermethods such as emulating the tab key. Once information is properlyinserted into the appropriate data receptacles, the data populationcommand is complete.

The Form Completion Program

In one embodiment of the invention, the form completion program uses aregistry with the operating system (OS) to assure proper execution. Theregistry contains multiple fields. Each field contains information thatmay be utilized by the form completion program during execution. Anexample of the kind of fields that may be placed in the registryfollows.

Field Name Description InstallPath Contains the path of installedprogram UpdateFile Contains the name and path to copy to be deletedLastUser Contains the name of last user Coordinate Contains thehorizontal coordinate (in pixel), of X the program window CoordinateContains the vertical coordinate (in pixel), of the Y program windowServer URL Contains URL(s) where update routine should check for a newversion of the program

When the form completion program is installed, a directory structure iscreated that contains files used by the form completion program duringexecution. This directory contains the form completion program and twosub-directories: “user” and “data”. The “user” sub-directory contains asmany sub-directories as there are users. Each sub-directory contains onefile called by the login name of the user, followed by the extension”.dat”. This file contains encrypted data about the user (e.g. address,credit card information, electronic money, etc . . . ,). The “data”sub-directory contains general information utilized by the formcompletion program during execution. For example, graphical images thatrepresent various kinds of data, web site information, and otherinformation useful to the form completion program is placed in the“data” sub-directory. The information placed in the “data” sub-directoryis organized in a tree of one or more additional sub-directories.

The “domain” sub-directory, for example, is located within the “data”sub-directory. In one embodiment of the invention, the “domain”sub-directory contains a database of information that is used by theform completion program to populate a form. For example, the databasemay contain a list of web sites (e.g. domain names) having forms thatcan be populated. Template files associated with each domain name arealso placed in the database.

The database contains sub-directories listing each of the top-leveldomain names (e.g..com, .net,. org, etc . . . ). Each sub-directory oftop-level domain names contains a tree of sub-directories organized inalphabetical order. When the form completion program initially launches,a startup routine begins to execute. The startup routine performs anumber of checks to ensure that the program is running properly. Theform completion program then launches a separate process, called athread, to determine if the form completion program that is running isthe most current version available. The process determines if theprogram is current by contacting a server. The server responds bytransmitting an update signal to the form completion program thatindicates whether or not the program is indeed out of date. If the formcompletion program is out of date, the program starts thedownload-update process.

After running the start-up checks the form completion program enters alistening mode. While in listening mode the program listens for anyaction that occurs within the display space of the form completionprogram, or hot keys. For example, the program listens for actionsreceived from the operating system (e.g. mouse pointer selection,keyboard key stroke, voice commands, etc . . . ). These actions arehandled by the application action listener which generates commandsaccording to an action-to-command map.

FIG. 6 illustrates some of the actions the form completion programlistens for when it is in the listening mode. When an action istriggered that is bound to a command (e.g. those being listened for),the form completion program runs the segment of code responsible forperforming the corresponding action. If, for example, the formcompletion program is in listening mode 600 and the user initiates alogin action 601, then the program performs a login operation 602. Inone embodiment of the invention, the login operation ensures that usersare properly authenticated before being allowed access to sensitivedata. For example, users are not permitted to access personalinformation such as a credit card number without first beingauthenticated. A user is authenticated when the user enters the correctlogin and password information.

However, in one embodiment of the invention, the user's passwordinformation is not stored by the form completion program. To determineif the user's login and password information is correct, the formcompletion program determines if the user has logged in before byexamining whether a directory having the name entered by the user as alogin parameter exists. If the user has not previously logged in, theuser is asked to provide a login name and a password. If the user haspreviously logged in (e.g. the user's directory exists), then theprogram generates a 32-bit number using a CRC Algorithm. A random numberkey is generated using the CRC output as a seed. If the correct randomnumber is generated, the user is authenticated. At this point, the useris permitted to access the user's sensitive data. This technique isbeneficial because it enables the form completion program toauthenticate a user without having to permanently store the user'spassword information. The present invention also contemplates the use ofvarious authentication schemes that are known in the art and is notlimited to the process discussed herein.

In one embodiment of the invention, after the login operation isperformed the form completion program proceeds to step 603 where itdetermines if the user is a new user. If the user is new, the formcompletion program advances to step 604 where it shows the user a datacollection interface. Once the user enters data into the data collectioninterface, the program executes step 605 where it displays a shoppingview to the user. The shopping view is comprised of one or moregraphical representations of the user's sensitive information.

It is possible for other types of actions to transpire while the formcompletion program is in listening mode. For example, the user mightwish to perform a shopping action 606. When a shopping action 606 occursthe form completion program performs a shopping operation 607. In oneembodiment of the invention, a shopping action occurs when the userselects an image indicative of a particular shopping destination. Forexample, if the form completion program displays a list of web sites tothe user, a shopping action 606 occurs when the user selects one of theweb sites on the list. When the user initiates the shopping action 606it causes the form completion program to perform step 607 where a webbrowser window is displayed to the user containing the web page the userselected from the list.

When a search action 608 occurs, the form completion program performs asearch 609. For example, in one embodiment of the invention the formcompletion program contains a location for the user to enter a searchquery and a way to identify a preferred search engine. If the userenters a search query and submits the query a search 609 is performed.The form completion program responds by passing the search parameterentered by the user to the preferred search engine identified by theuser. The results of the search are displayed inside of a web browserwindow that runs external to the form completion program.

If an update action 610 occurs, the form completion program performs anupdate 611. During an update operation 611 the form completion programchecks to see if the version of the program currently executing is themost recent version available. In one embodiment of the invention, theupdate operation 611 queries a server via a network to determine thelatest available version is. If the form completion program currentlyexecuting is in need of a version update, the program starts an updatethread to handle the update process. When the execution of the updateprocess is complete, the form completion program running is the mostrecent version. The update operation 611, for example, may be utilizedto add functionality to the form completion program.

The form completion program may be configured to listen for actionsother than the ones identified in FIG. 6. For example, the user maycustomize the program to listen for a specific type of action. Thepresent invention also contemplates action added by the update operation611.

When a FillOut Information action 612 is performed the form completionprogram executes step 613. At step 613, the user is prompted forinformation. In one embodiment of the invention, the user is shown adata collection interface that provides locations for the user to entera particular type of information. For example, the user may be promptedfor personal information, payment information, and/or any other type ofinformation deemed necessary to populate a form. This information may beassociated with an image file, text file, multimedia file, or otherrepresentation of the data entered into the data collection interface.

If a FillOut Form action 614 occurs, the form completion programexecutes a data population command 615. The data population command 615provides the user with a mechanism for populating a form. When the userelects to stop running the form completion program, a quit action 616occurs. When a quit action 616 executes the form completion programreturns to an inactive state.

Referring now to FIG. 7, an example of several of the interfacespresented to the user by the form completion program is shown. When theuser initially opens the form completion program, a login interface 715is displayed which provides the user with locations for a user name 711and password 712. In one embodiment of the invention, a login action 601occurs when the user enters the appropriate information into the logininterface 715 and presses the return key.

If the user is properly authenticated the form completion programdisplays a data collection interface 720. the data collection interface720 contains one or more fields 705-709 for entering data. When the userenters data into these fields 705-709 the data is stored for later useduring a form population command. There are several different types ofdata collection interfaces 720. Each type is used to obtain a differentdata set from the user. For example, the user is presented one interfacefor entering payment information and another interface for enteringpersonal information.

If, for example, the data collection interface 720 intended forcollecting payment information is displayed, the user is provided withone or more fields 705-709 for entering data. Each field is intended tostore a different type of information. For example, field 705 is used tocollect the form of payment (e.g. American Express) the user wishes toutilize for later populating a form. Fields 706-709 provides a place forthe user to enter information related to the form of payment identified.The name of the issuing bank is entered into field 706. The accountnumber of the identified card is entered into field 707 and theexpiration date and name on the card are entered into fields 708 and709.

Once the user enters such information into fields 705-709 it is storedby the form completion program for later use. In one embodiment of theinvention, the data collected via the data collection interface isstored on the computer having the form completion program in encryptedform and protected from unauthorized users by an authenticationmechanism. For example, data about a particular user may be stored in adirectory bearing the user's login name. Before access is granted to theinformation in that directory the user is prompted for a name andpassword. If the appropriate user name and password is entered, thenaccess is granted to the specified user's data. When the correctinformation is not entered access is denied. This permits multiple usersto make use of the form completion program and prevents unauthorizedusers from inappropriately obtaining access to another users data.

In one embodiment of the invention, each collection of data entered intothe data collection interface 720 is associated with a representation ofthat data. The representation may be in the form of image data, textdata, multimedia data, and/or any other kind of data. For example, ifdata collection interface 720 prompts the user for payment information,a graphic representing that payment information (e.g. a Visa Cardgraphic) will be displayed to the user.

For example, the shopping interface 730 displays numerousrepresentations 701-702 of each data set entered by the user via thedata collection interface 720. Each representation 701-702 may representa different data set. For example, representation 701 might represent aform of payment whereas representation 702 might represent a user'spersonal information.

Additional representations may be displayed when the user scrolls eitherup or down using command buttons 731 and 732.

In one embodiment of the invention, a portion of the shopping interface730 is dedicated to displaying a list 710 of web sites where the usercan purchase goods and/or services. This list 710 can be changed andmodified by the update action 610. The list 710 may be organized in anymanner preferred by the user. In one embodiment of the invention, thelist 710 is divided into categories. When the user selects a link to aparticular web site from list 710, the form completion program passesthe URL information identified by the users action to a web browserprogram. The browser program, for example, accesses the web siteidentified in the URL to obtain the web page identified in the URL. Ifafter perusing through the web site the user needs to complete a form topurchase an item, the user may use the form completion program topopulate the form.

To illustrate, when the user encounters a form (e.g. after shopping),the user may elect to populate the data receptacles 751-755 of that formwith the information associated with a particular representativegraphic. If, for example, the user wishes to fill-out form 750 withpayment information, the user may cause a data population command toexecute by utilizing a pointing device to drag representation 701 alongpath 725 until the pointing device resides over form 750. When thepointing device is located over form 750 the data population commandexecutes. The data population command causes data receptacles 751-755 tofill with data.

In one embodiment of the invention, the user is not required to dragrepresentation 701 over to form 750, but can instead drag an iconosizedversion of representation 701 to form 750 in order to initiate a datapopulation command. The iconosized version of representation 701 is asmaller image of graphical representation 701 that requires lessprocessor overhead to rapidly move about the display region. Theinvention also contemplates the use of other mechanisms to initiate adata population command. The form completion program can, for example,be configured to perform a data population command whenever the userperforms an event that discernibly indicates the user wishes to populatea form (e.g. a click event or a menu event).

Embodiment of Computer Execution Environment (Hardware)

An embodiment of the invention can be implemented as computer softwarein the form of computer readable code executed on a general purposecomputer such as computer 800 illustrated in FIG. 8, or in the form ofbytecode class files executable within a Java™ runtime environmentrunning on such a computer, or in the form of bytecodes running on aprocessor (or devices enabled to process bytecodes) existing in adistributed environment (e.g., one or more processors on a network). Akeyboard 810 and mouse 811 are coupled to a system bus 818. The keyboardand mouse are for introducing user input to the computer system andcommunicating that user input to processor 813. Other suitable inputdevices may be used in addition to, or in place of, the mouse 811 andkeyboard 810. I/O (input/output) unit 819 coupled to system bus 818represents such I/O elements as a printer, A/V (audio/video) I/O, etc.

Computer 800 includes a video memory 814, main memory 815 and massstorage 814, all coupled to system bus 818 along with keyboard 810,mouse 811 and processor 813. The mass storage 814 may include both fixedand removable media, such as magnetic, optical or magnetic opticalstorage systems or any other available mass storage technology. Bus 818may contain, for example, thirty-two address lines for addressing videomemory 814 or main memory 815. The system bus 818 also includes, forexample, a 64-bit data bus for transferring data between and among thecomponents, such as processor 813, main memory 815, video memory 814 andmass storage 814. Alternatively, multiplex data/address lines may beused instead of separate data and address lines.

In one embodiment of the invention, the processor 813 is amicroprocessor manufactured by Motorola, such as the 680X0 processor, ora microprocessor manufactured by Intel, such as the 80X86, or Pentiumprocessor. However, any other suitable microprocessor or microcomputermay be utilized. Main memory 815 is comprised of dynamic random accessmemory (DRAM). Video memory 814 is a dual-ported video random accessmemory. One port of the video memory 814 is coupled to video amplifier816. The video amplifier 816 is used to drive the cathode ray tube (CRT)raster monitor 817. Video amplifier 816 is well known in the art and maybe implemented by any suitable apparatus. This circuitry converts pixeldata stored in video memory 814 to a raster signal suitable for use bymonitor 817. Monitor 817 is a type of monitor suitable for displayinggraphic images.

Computer 800 may also include a communication interface 840 coupled tobus 818. Communication interface 840 provides a two-way datacommunication coupling via a network link 841 to a local network 844.For example, if communication interface 840 is an integrated servicesdigital network (ISDN) card or a modem, communication interface 840provides a data communication connection to the corresponding type oftelephone line, which comprises part of network link 841. Ifcommunication interface 840 is a local area network (LAN) card,communication interface 840 provides a data communication connection vianetwork link 841 to a compatible LAN. Wireless links are also possible.In any such implementation, communication interface 840 sends andreceives electrical, electromagnetic or optical signals which carrydigital data streams representing various types of information.

Network link 841 typically provides data communication through one ormore networks to other data devices. For example, network link 841 mayprovide a connection through local network 844 to local server computer843 or to data equipment operated by an Internet Service Provider (ISP)844. ISP 844 in turn provides data communication services through theworld wide packet data communication network now commonly referred to asthe “Internet” 845. Local network 844 and Internet 845 both useelectrical, electromagnetic or optical signals which carry digital datastreams. The signals through the various networks and the signals onnetwork link 841 and through communication interface 840, which carrythe digital data to and from computer 800, are exemplary forms ofcarrier waves transporting the information.

Computer 800 can send messages and receive data, including program code,through the network(s), network link 841, and communication interface840. In the Internet example, remote server computer 846 might transmita requested code for an application program through Internet 845, ISP844, local network 844 and communication interface 840.

The received code may be executed by processor 813 as it is received,and/or stored in mass storage 814, or other non-volatile storage forlater execution. In this manner, computer 800 may obtain applicationcode in the form of a carrier wave.

Application code may be embodied in any form of computer programproduct. A computer program product comprises a medium configured tostore or transport computer readable code, or in which computer readablecode may be embedded. Some examples of computer program products areCD-ROM disks, ROM cards, floppy disks, magnetic tapes, computer harddrives, servers on a network, and carrier waves.

The computer systems described above are for purposes of example only.An embodiment of the invention may be implemented in any type ofcomputer system or programming or processing environment.

Thus, a method and apparatus for populating forms is described.

What is claimed is:
 1. A method for populating a form with datacomprising: obtaining a form from a source location; said form having atleast one data receptacle; displaying said form to a user; obtainingdata for populating said form; storing said data in a secure storagemedium; obtaining values for said data receptacles of said form fromsaid secure storage medium when said form resembles a portion of atemplate file to a certain threshold.
 2. The method of claim 1 furthercomprising: determining when said form resembles a template file byexamining a regular expression.
 3. The method of claim 1 furthercomprising: associating a graphical representation with said data. 4.The method of claim 1 wherein said data is obtained from said user. 5.The method of claim 1 wherein said data is obtained from a data providervia a network communication medium.
 6. The method of claim 1 furthercomprising: authenticating said user before access to said securestorage medium is permitted.
 7. The method of claim 1 wherein said datastored in said secure storage medium is encrypted.
 8. The method ofclaim 1 wherein said secure storage medium resides on a web client. 9.The method of claim 2 wherein said template file comprises at least oneform description.
 10. The method of claim 9 wherein said formdescription is associated with said regular expression.
 11. The methodof claim 9 wherein said form description is associated with a list ofcontrols comprising one or more controls.
 12. The method of claim 11wherein each of said one or more controls is associated with an index, asymbol, and a control type description.
 13. A method for populating aform with data comprising: displaying a form having at least one datareceptacle; displaying a form completion interface having a portionrepresentative of a data set; determining if said form resembles atemplate file to a given threshold level; populating said at least onedata receptacle with said data set when said portion is moved from saidform completion interface to said form.
 14. The method of claim 13further comprising: presenting a first display region to a user;obtaining said data set from said user via said first display region;granting said user access to a second display region having a graphicalrepresentation associated with said data set when said user isauthenticated.
 15. The method of claim 13 further comprising: storingsaid data set in a secure storage medium.
 16. The method of claim 13wherein said step of determining if said form resembles said templatefile to within a certain threshold is accomplished by comparing a formimage of said form to said template file.
 17. The method of claim 13further comprising obtaining said template file from a web client. 18.The method of claim 13 further comprising obtaining said template filefrom a server computer.
 19. A computer program product comprising: acomputer usable medium having computer readable program code embodiedtherein for populating a form, said computer program product comprising:computer readable program code configured to cause a computer to obtaina form from a source location, said form having at least one datareceptacle; computer readable program code configured to cause acomputer to display said form to a user; computer readable program codeconfigured to cause a computer to obtain data for populating said form;computer readable program code configured to cause a computer to storesaid data in a secure storage medium; computer readable program codeconfigured to cause a computer to obtain values for said datareceptacles of said form from said secure storage medium when said formresembles a template file to within a certain threshold.
 20. Thecomputer program product of claim 19 further comprising computerreadable program code configured to cause a computer to obtain data froma user.
 21. The computer program product of claim 19 further comprisingcomputer readable program code configured to cause a computer to obtaindata from a data provider.
 22. The computer program product of claim 19further comprising a computer readable program code configured to causea computer to associate a graphical representation with said data. 23.The computer program product of claim 19 further comprising computerreadable program code configured to cause a computer to obtain a formimage representative of said form.
 24. The computer program product ofclaim 19 further comprising computer readable program code configured tocause a computer to compare said form image to said template file anddetermine if said form image resembles said template file.
 25. Thecomputer program product of claim 19 further comprising computerreadable program code configured to authenticate said user before accessto said secure storage medium is permitted.
 26. The computer programproduct of claim 19 wherein said data in said secure storage medium isencrypted.
 27. The computer program product of claim 19 wherein saidsecure storage medium resides on a web client.
 28. A system forpopulating a form with data comprising: a display region configured todisplay a form having at least one data receptacle; and a formcompletion program configured to copy data into said at least one fieldwhen a form resembles at least one of a plurality of template files. 29.The system of claim 28 wherein said data is stored in a secure storagemedium.
 30. The system of claim 29 wherein said secure storage mediumresides on a web client.
 31. The system of claim 29 wherein said securestorage medium resides on a server computer.
 32. The system of claim 28wherein said form completion program collects said data from a user viaa data collection interface.
 33. A system for supplying data to a formcomprising: a computational device configured to display a form havingat least one data receptacle, said computational device configured toperform the steps of: obtaining data about a user; and populating saidat least one data receptacle with said data when said form resembles atleast one of a plurality of template files.