US20220350984A1 - Identity verification in a document management system - Google Patents
Identity verification in a document management system Download PDFInfo
- Publication number
- US20220350984A1 US20220350984A1 US17/246,447 US202117246447A US2022350984A1 US 20220350984 A1 US20220350984 A1 US 20220350984A1 US 202117246447 A US202117246447 A US 202117246447A US 2022350984 A1 US2022350984 A1 US 2022350984A1
- Authority
- US
- United States
- Prior art keywords
- name
- identity
- document
- feature
- recipient
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G06K9/00181—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/30—Writer recognition; Reading and verifying signatures
- G06V40/37—Writer recognition; Reading and verifying signatures based only on signature signals such as velocity or pressure, e.g. dynamic signature recognition
- G06V40/394—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G06K9/00187—
-
- G06K9/00442—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/40—Document-oriented image-based pattern recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/30—Writer recognition; Reading and verifying signatures
- G06V40/37—Writer recognition; Reading and verifying signatures based only on signature signals such as velocity or pressure, e.g. dynamic signature recognition
- G06V40/382—Preprocessing; Feature extraction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Definitions
- This disclosure relates generally to electronic document management, and more specifically to verifying entity identities for interacting with documents in a document management system.
- Document management systems manage electronic documents for various entities (e.g., people, companies, organizations). Such electronic documents may include various types of agreements that can be executed (e.g., electronically signed) by entities, such as non-disclosure agreements, indemnity agreements, purchase orders, lease agreements, employment contracts, etc. Document management systems may employ techniques to verify an identity of an entity before allowing the entity to interact with a document, such as to execute an agreement. For example, conventional document management systems may receive trusted identity information from a user attempting to interact with a document and use the trusted identity information to verify an identity claimed by the user. For example, identity information may be extracted from a government issued form of identification, such as a driver license or passport.
- conventional systems fail to accurately validate user identities in cases where identity information differs from an expected result (e.g., a claimed identity). For example, conventional systems fail to recognize alternative representations of the same name. Due to these failings, conventional systems prevent users that are accurately claiming an identity from interacting with documents or taking other actions. As such, improved techniques for verifying user identities for interacting documents are needed.
- a document management system performs name matching operations to validate an identity claimed by a recipient of a document.
- the document management compares name data obtained from an identity data source with name data corresponding to a recipient entity of a document (e.g., an individual person, organization, or company) to determine whether name features of the identity source name data and recipient name data match.
- the name matching operations performed by the document management system may include applying a set of name matching rules to the identity source name data and the recipient name data to determine whether features that differ between the identity source name data and the recipient name data are acceptable alternative representations.
- name data may have differing letter cases (e.g., capital or lowercase letters), differing use of diacritics (e.g., e vs é), differing use of transliterations (e.g., Juergen vs Jürgen), differing use of first, middle, or last names), or other differences that may be acceptable alternatives according to the set of name matching rules.
- Identity source name data may be received from a variety of identity data sources, such as being extracted from an identity document of a user or received from a trusted service provider or other suitable provider of identity information.
- the document management system may authorize the recipient entity to perform one or more actions relevant to a received document, such as executing an agreement represented by the document (e.g., electronically signing the document).
- the document management system may prevent the recipient entity from performing actions relevant to the received document.
- FIG. 1 is a block diagram of a system environment in which a centralized document system operates, according to one embodiment.
- FIG. 2 is a block diagram of a centralized document system, according to one embodiment.
- FIG. 3A depicts an example application of case sensitivity name matching rules to letter case name features of identity document name data, according to one embodiment.
- FIG. 3B depicts an example application of diacritics name matching rules to diacritic name features of identity document name data, according to one embodiment.
- FIG. 3C depicts an example application of transliteration name matching rules to transliteration name features of identity document name data, according to one embodiment.
- FIG. 3D depicts an example application of name type name matching rules to name type name features of identity document name data, according to one embodiment.
- FIG. 3E depicts an example application of special character name matching rules to name type features of identity document name data, according to one embodiment.
- FIG. 3F depicts an example application of initial name matching rules to initial name features of identity document name data, according to one embodiment.
- FIG. 3G depicts an example application of suffix name matching rules to suffix name features of identity document name data, according to one embodiment.
- FIG. 4 is a flowchart illustrating a process for validating an identity of a recipient entity using name matching rules, according to one embodiment.
- a system environment enables an originating entity to create and send documents to one or more recipient entities for negotiation, collaborative editing, electronic execution (e.g., electronic signature), automation of contract fulfilment, archival, and analysis, among other tasks.
- a recipient entity may review content or terms presented in a digital document, and in response to agreeing to the content or terms, can electronically execute the document.
- the originating entity in advance of the execution of the documents, the originating entity may generate a document package to provide to the one or more recipient entities.
- the document package includes at least one document to be executed by one or more recipient entities.
- the document package may also include one or more permissions defining actions the one or more recipient entities can perform in association with the document package.
- the document package may also identify tasks the one or more recipient entities are to perform in association with the document package.
- the document package may include name matching rules for verifying an identity of an entity claiming to be one of the one or more recipient entities for a document, such as name matching rules configured by the originating entity.
- the system environment described herein can be implemented within a centralized document system, an online document system, a document management system, or any type of digital management platform. It should be noted that although description may be limited in certain contexts to a particular environment, this is for the purposes of simplicity only, and in practice the principles described herein can apply more broadly to the context of any digital management platform. Examples can include but are not limited to online signature systems, online document creation and management systems, collaborative document and workspace systems, online workflow management systems, multi-party communication and interaction platforms, social networking systems, marketplace and financial transaction management systems, or any suitable digital transaction management platform. It should also be noted that “centralized document system”, “document management system”, and other similar terminology are used interchangeably herein.
- the processes described herein provide a means for the one or more recipient entities to verify their identity to perform one or more actions in relation to a document package, such as executing an agreement, accessing a document, modifying a document, or any other suitable action.
- the centralized document system facilitates a name matching process wherein name data received from an identity data source (identity source name data) is compared to name data corresponding to a recipient entity (recipient name data).
- identity source name data name data
- recipient name data may be included in a document package.
- the name matching process includes one or more name matching operations whereby features of the identity source name data and recipient name data are compared.
- a name matching operation may be performed by applying one or more name matching rules of a set of name matching rules to relevant name features.
- the name matching rules describe constraints for determining whether a name feature of the recipient name data is an allowed alternative representation of a name feature of the identity source name data, or vice versa. Particular examples of name matching rules are described in detail below with reference to FIGS. 3A-G .
- FIG. 1 is a block diagram of a system environment in which a centralized document system operates, according to one embodiment.
- the system environment 100 shown by FIG. 1 comprises a centralized document system 110 , a network 120 , an originating entity 130 associated with an originating user device 135 , a recipient entity 140 associated with a recipient user device 145 .
- a centralized document system 110 comprises a centralized document system 110 , a network 120 , an originating entity 130 associated with an originating user device 135 , a recipient entity 140 associated with a recipient user device 145 .
- different or additional components may be included in the system environment 100 .
- the centralized document system 110 is a computer system (or group of computer systems) for storing and managing documents or document packages (e.g., envelopes) for various entities. Using the centralized document system 110 , entities can collaborate to create, edit, review, negotiate, and execute documents. During execution of one or more documents, the centralized document system 110 provides a means for generating and modifying a document package (also referred to as a document envelope). The document package may include at least one document for execution. The centralized document system 110 may provide the at least one document (e.g., a contract, agreement, purchase order, or other suitable document) in which terms have been agreed upon by two or more entities (e.g., by two or more individual users or organizations) to a recipient entity 140 for execution, as described above.
- documents or document packages e.g., envelopes
- entities can collaborate to create, edit, review, negotiate, and execute documents.
- the centralized document system 110 provides a means for generating and modifying a document package (also referred to as a document
- the centralized document system 110 may generate the document package per a request from an originating entity 130 .
- the document package may additionally include a set of document permissions.
- the centralized document system 110 may provide a means for the recipient entity 140 to request to assign the set of document permissions to a second recipient entity (e.g., within a same or different organization).
- the centralized document system 110 may scan the document package (including the document) to determine whether the document package includes a document of a particular type, and if so, may provide the document package to additional recipient entities not originally specified to receive the document package.
- the centralized document system 110 modifies the document package to be sent to a substitute recipient entity based on the original recipient entity being unavailable.
- the centralized document system 110 can be a server, server group or cluster (including remote servers), or another suitable computing device or system of devices.
- the centralized document system 110 can communicate with user devices (e.g., the originating user device 135 or the recipient user device 145 ) over the network 120 to receive instructions and send document packages (or other information) for viewing on user devices.
- user devices e.g., the originating user device 135 or the recipient user device 145
- the centralized document system 110 will be discussed in further detail with respect to FIG. 2 .
- the network 120 transmits data within the system environment 100 .
- the network 120 may comprise any combination of local area or wide area networks, using both wired or wireless communication systems, such as the Internet.
- the network 120 transmits data over a single connection (e.g., a data component of a cellular signal, or Wi-Fi, among others), or over multiple connections.
- the network 120 uses standard communications technologies or protocols.
- the network 120 includes communication links using technologies such as Ethernet, 802.11, 3G, 4G, code division multiple access (CDMA), digital subscriber line (DSL), and the like.
- Data exchanged over the network 120 may be represented using any suitable format, such as hypertext markup language (HTML) or extensible markup language (XML).
- the network 120 may include encryption capabilities to ensure the security of customer data.
- encryption technologies may include secure sockets layers (SSL), transport layer security (TLS), virtual private networks (VPNs), and Internet Protocol security (IPsec), among others.
- the centralized document system 110 can communicate with user devices associated with entities (e.g., the originating user device 135 or the recipient user device 145 ).
- entities can represent an individual user, group, organization, or company that is able to interact with document packages (or other content) generated on or managed by the centralized document system 110 .
- Each entity can be associated with a username, email address, full or partial legal name, or other identifier that can be used by the centralized document system 110 to identify the entity and to control the ability of the entity to view, modify, execute, or otherwise interact with document packages managed by the centralized document system 110 .
- entities can interact with the centralized document system 110 through a user account with the centralized document system 110 and one or more user devices accessible to that user entity.
- an originating entity 130 creates the document package via the centralized document system 110 .
- the document package is sent by the centralized document system 110 for review and execution by the recipient entity 140 .
- the recipient entity 140 may be associated with recipient name data representing an identity of an individual corresponding to the recipient entity. For instance, the individual may be s a user having a user account with the centralized document system 110 .
- the originating user device 135 and the recipient user device 145 are computing devices capable of receiving user input as well as transmitting to, or receiving data from, the centralized document system 110 via the network 120 .
- the user devices 135 or 145 can be a desktop or a laptop computer, a smartphone, tablet, or another suitable device.
- the user devices 135 or 145 are configured to communicate via the network 120 (for example, with the centralized document system 110 ).
- the user device 135 or 145 executes an application allowing a user of the user device to interact with the centralized document system 110 .
- the user devices 135 or 145 can execute a browser application to enable interaction between the user device and the centralized document system 110 via the network 120 .
- a single entity can be associated with multiple user devices, or one user device can be shared between multiple entities who may, for example, log into a personal account on the user device to access the centralized document system 110 .
- the identity data source 150 is a trusted source of name data that can be used to verify an identity of the recipient entity 140 (e.g., a user) to execute a received document.
- the identity data source 150 is an identity document for an individual user of the recipient user device 145 , such as a driver's license, a passport, or other form of government issued identification.
- the recipient entity 140 may obtain an image of the identity document to provide to the centralized document system 110 , such as by using a camera component of the recipient user device 145 to capture the image.
- the recipient user device 145 , the centralized document system 110 , or a third-party system may process the image of the identity document to extract identity source name data.
- the identity data source 150 may be a trusted service provider storing identity information for the recipient entity 140 , such as a private or governmental database storing identity information corresponding to one or more individuals.
- the recipient device 145 may obtain identity source name data from the trusted service provider for providing to the centralized document system 110 or authorize the trusted service provider to provide identity source name data directly to the centralized document system 110 .
- the identity data source 150 is connected to the recipient user device 145 in the embodiment of FIG. 1 , this is done for the purpose of illustration only, and in various embodiments the identity data source 150 may be accessed by, or communicate with, any components of the system environment 100 .
- FIG. 2 is a block diagram of a centralized document system 110 , according to one embodiment.
- Components of the centralized document system 110 may be a combination of hardware and software.
- the centralized document system 110 includes an account data store 210 , an envelope data store 220 , an envelope generation module 230 , an envelope modification module 240 , an identity verification module 250 , and an interface module 260 .
- the centralized document system 110 may include fewer or additional components that are not shown in FIG. 2 .
- conventional components such as network interfaces, security functions, load balancers, failover servers, management and network operations consoles, and the like are not shown so as to not obscure the details of the system architecture.
- the functions of the centralized document system 110 may be distributed among the components in a different manner than described.
- the account data store 210 is a file storage system, database, set of databases, or other data storage system storing information associated with accounts of the centralized document system 110 .
- Entities may be associated with one or more accounts with the centralized document system 110 .
- a parent entity may be associated with a parent account (e.g., an organization) and a set of child entities of the parent entity (e.g., employees of an organization) may be associated with a user account.
- the originating entity 130 or the recipient entity 140 may have corresponding parent accounts or user accounts with the centralized document system 110 .
- the parent account or user accounts may be associated with a policy or an organization chart for an entity.
- a policy for an entity is a system of principles that guide certain processes or workflows for the entity.
- a policy may dictate which recipient entities are to receive document packages and a set of tasks the recipient entities are to perform in relation to the document package or a set of permissions the recipient entities may be subject to in relation to the document package.
- the policy specifies a set of name matching rules to be used to verify the identities of recipient entities (e.g., in order to execute agreements), as described in greater detail below with reference to the identity verification module 250 .
- the policy specify criteria that must be satisfied for an entity to be authorized to access or modify the document package, such as threshold number or percentage of name matching rules that must be satisfied to verify the identity of a recipient entity.
- the policy specifies acting entities and corresponding sets of tasks for the acting entities to perform in relation to the document package based on document types or types of document content of the one or more documents included in the document package.
- the policy specifies one or more thresholds corresponding to one or more types of document content (e.g., a payment amount, a payment term, etc.).
- a policy may specify a threshold payment amount and corresponding acting entities and sets of tasks for the acting entities to perform if a payment amount within a document package exceeds the threshold payment amount.
- the org chart may include a list of entities (e.g., including names, titles, roles, departments, direct reports, supervisors, teams, groups, etc.) within an organization.
- Each user account associated with an entity may include information about the entity, such as information about the individual with access to the user account, age of the account, frequency of account use, log of past account transactions, and the like.
- Information about the individual with access to the account may include name data representing the individual's name (e.g., first name, last name, middle name, suffixes, nicknames, etc.), email address, organization name, title, role, department, and the like.
- the individual's title is a position title or job title held by the individual with an organization.
- the individual's role is a function that the individual fulfills within their organization. For example, a title may be “General Counsel” and a role may be reviewing and executing agreements.
- the individual's department is a group within the organization where the individual works. For example, a department may be operations, finance, sales, human resources, purchases, legal, and the like.
- the envelope data store 220 is a file storage system, database, set of databases, or other data storage system storing information associated with document envelopes. Originating entities (e.g., the originating entity 130 ) provide one or more documents to recipient entities (e.g., the recipient entity 140 ) via envelopes.
- a document envelope (also referred to as a document package herein) can include at least one document for execution. The at least one document may have been previously negotiated by an originating entity and a recipient entity. And, as such, the document may be ready for execution upon the creation of an envelope.
- the document package may also include recipient information and document fields indicating which fields of the document need to be completed for execution (e.g., where the recipient entity 140 should sign, date, or initial the document).
- the recipient information may include contact information for a recipient entity (e.g., a name and email address).
- the document package may also include a set of permissions.
- the set of permissions may be assigned by an originating entity 130 .
- the set of permissions included in the document package define one or more actions that a recipient entity can perform with regard to the document package.
- the one or more actions may include adding one or more additional recipient entities to the document package, removing one or more recipient entities from the document package, updating an order in which two or more recipient entities receive the document package, updating one or more tasks of one or more recipient entities of the document package, adding one or more additional documents to the document package, removing one or more documents from the document package, providing a notification (e.g., “Documents within document package need careful review”) to one or more recipient entities about the document package, and the like.
- a notification e.g., “Documents within document package need careful review”
- the originating entity 130 may set the following permissions for a document package: allow recipient entity 140 to add additional recipient entities, allow recipient entity 140 to remove one or more documents from the document package, allow recipient entity 140 to execute one or more documents, allow recipient entity 140 to modify one or more documents, and the like.
- the document package may also identify a first set of acting entities, and for each acting entity, the document package may also identify a first set of tasks that the acting entity is to perform with regard to the document package.
- the first set of tasks may define what each acting entity is to do and complete before the at least one document of the document package can be executed.
- the set of tasks may include reviewing the at least one document, initialing the at least one document, signing the at least one document, providing information for the at least one document, and the like.
- the envelope generation module 230 may generate envelopes for an originating entity to send to a recipient entity. For example, the envelope generation module 230 may generate an envelope for the originating entity 130 to send to the recipient entity 140 . In a specific implementation, the envelope generation module 230 may receive instructions from the originating entity 130 to generate an envelope (also referred to as a document package) that will be sent to one or more recipient entities. The envelope generation module 230 may generate a document package that includes at least one document for execution (e.g., an agreement). In an implementation, the envelope generation module 230 may generate a document package that may also include a set of permissions corresponding to each document of the document package.
- an envelope also referred to as a document package
- the envelope generation module 230 may generate a document package that identifies a first set of acting entities and for each acting entity a first set of tasks that each acting entity of the first set of acting entities is to perform with regards to the document package (for instance before the documents of the document package can be executed).
- the envelope generation module 230 may provide the document package to one or more recipient entities after the document package has been generated per a request from an originating entity. In alternative embodiments, the envelope generation module 230 may provide the document package to one or more recipient entities after the document package has been modified by the envelope modification module 240 .
- the envelope modification module 240 manages modifications made to a document package.
- the modifications are requested by a recipient entity (e.g., a user of the recipient user device 145 ) and provided to an originating entity for approval (e.g., by a user of the originating user device 135 ).
- the modifications are automatically applied by the envelope modification module 240 after being requested by a user (such as the recipient entity 140 ).
- Modifications to a document package may include a variety of actions, such as executing a document (e.g., via electronic signature) or changing document permissions for the document package (e.g., assigning document permissions to an additional recipient entity).
- the envelope modification module 240 may authorize a recipient entities to access or modify document packages before performing modifications or other actions requested by the recipient entity.
- the envelope modification module 240 may verify an identity of a recipient entity before allowing the recipient entity to make modifications or perform other actions on a document package. For instance, by communicating with the identity verification module 250 , as described in greater detail below.
- the envelope modification module 240 applies one or more policies described by a document package to authorize a recipient entity to make modifications or perform other actions on the document package.
- the envelope modification module 240 may apply one of the policies described above with relation to the account data store 210 .
- the envelope modification module 240 may apply multiple policies for authorizing a recipient entity to modify a document package, where some or all of the policies may need to be successfully satisfied in order for a recipient entity to e authorized.
- the envelope modification module 240 may use various processes or criteria to evaluate the results of applying the multiple policies, such as by weighting the policies by relative priority or determining whether the satisfied policies meet a threshold criteria (e.g., a number of type of satisfied policies).
- the identity verification module 250 verifies identities of recipient entities of document packages, e.g., for authorizing the recipient entities to modify the document packages.
- the identity verification module 250 receives identity source name data from an identity data source (e.g., the identity data source 150 ) and compares the identity source name data to recipient name data corresponding to the recipient entity (e.g., name data included in the document package) by performing one or more name matching operations on name features of the identity source name data and the recipient name data.
- the one or more name matching operations include applying a set of name matching rules to the name features.
- the name matching rules describe constraints for determining whether a name feature of the recipient name data is an allowed alternative representation of a name feature of the identity source name data, or vice versa.
- the name matching rules may be included in the document package or otherwise configured by an originating entity for the document package.
- the name matching rules may include rules relating to different types of name features, such as letter cases, diacritics, transliterations, name types (e.g., first, middle, last), special characters (e.g., initials), suffixes, etc. Applying name matching rules relating to various types of name features are described in greater detail below with reference to FIGS. 3A-F .
- the identity verification module 250 may initially compare the identity source name data to the recipient name data to determine whether they are an exact match or have one or more differing name features. In the case of an exact match, the identity verification module 250 may verify the identity of the recipient entity. In the case of differing name features, the identity verification module 250 may apply the name matching rules to determine whether the identity source name data and the recipient name data match despite the one or more differing name features, such as due to the one or more differing name features being acceptable equivalent representations based on the name matching rules. If the identity verification module 250 determines the identity source and recipient name data match based on the initial comparison or by applying the name matching rules, the identity verification module 250 may verify the identity of the recipient entity.
- the identity verification module 250 determines the identity source and recipient name data do not match based on the initial comparison or by applying the name matching rules, the identity verification module 250 rejects the identity verification attempt. In this case, the centralized document system 110 may not authorize the recipient entity to perform one or more actions on a relevant document package, such as executing an agreement.
- the identity verification module 250 prompts a recipient entity to provide identity source name data for confirming the recipient entity's identity.
- the identity verification module 250 or the interface module 260 may provide an interface to a recipient user device (e.g., the recipient user device 145 ) describing one or more options for a user of the recipient user device to provide identity source name data.
- the options for providing identity source name data may include providing an image of an identity document or requesting identity source name data from a trusted service provider, as described above with reference to the identity data source 150 . If an image of an identity document is used as an identity data source, the identity verification module 250 may process the image to extract identity source name data.
- the identity verification module 250 may apply a trained machine learning model to the image to extract the identity source name data.
- the model may be trained by the centralized document system 110 or may be trained or otherwise provided by a third-party system (e.g., a third-party image processing service).
- the interface module 260 may generate user interfaces allowing entities to interact with document packages managed by the centralized document system 110 .
- the interface module 260 may generate a user interface for an originating entity 130 to generate a document package.
- the interface module 260 may generate a user interface for a recipient entity 140 to view a document package.
- the interface module 260 may provide a user interface enabling a recipient entity 140 to modify a document package.
- the interface module 260 may display a listing of the one or more recipient entities 140 of the document package to a recipient entity 140 on an electronic display of a user device 145 .
- the interface module 260 may provide one or more interface elements (e.g., links, buttons, checkboxes, etc.) on the electronic display for the recipient entity 140 to select in order to request to assign a set of document permissions to an additional recipient entity 140 .
- the interface module 260 may generate a user interface for displaying a notification to a recipient entity 140 that an additional recipient entity 140 cannot be assigned the set of document permissions.
- FIGS. 3A-F depict example applications of name matching rules corresponding to different types of name features of identity source name data included in identity documents.
- the examples depicted in FIGS. 3A-F are provided for the purpose of illustration only, and other types of identity documents or name features may be used by the centralized document to verify an identity of recipient entities. For instance, other types of identity documents than driver licenses may be used.
- the identity source name data included in the identity documents depicted in FIGS. 3A-F may be extracted from an image of the identity document 302 , as described above with reference to the identity data source 150 and the identity verification module 250 .
- 3A-F may be included in a document package received by a recipient entity or otherwise associated with a recipient entity. Note that although the matching recipient name data depicted in FIGS. 3A-F does not include names that exactly match the identity document name data, this is done in order to illustrate sets of name data that match despite having differing name features. One skilled in the art will appreciate that recipient name data and identity document name data that do not have any differing name features can also be considered to match.
- FIG. 3A depicts an example application of case sensitivity name matching rules 300 to letter case name features of identity document name data 304 .
- the case sensitivity name matching rules 300 describe constraints relating to how letter case should or should not be considered for determining if identity source and recipient name data match.
- the case sensitivity name matching rules 300 may include various specific rules that result in identity document name data matching or not matching recipient name data.
- the case sensitivity name matching rules 300 include a rule to “ignore case sensitivity” in comparing identity document name data to recipient name data. For instance, according to the “ignore case sensitivity rule” both “M” and “m” are equivalent. As such, applying the “ignore case sensitivity” rule results in the name represented by the identity document name data 304 matching each name represented by matching recipient name data 306 .
- the identity document name data 304 is included in an identity document 302 and includes a first name “MICHAEL” and a last name “REAVES,” both of which are represented using all capital letters.
- the matching recipient name data 306 includes names represented with different letter case name features than the identity document name data 304 but which still match the identity document name data 306 based on the case sensitivity name matching rules 300 .
- the case sensitivity name matching rules may include additional or alternative rules, such as ignoring case sensitivity for a subset of letters.
- FIG. 3B depicts an example application of diacritics name matching rules 310 to diacritic name features of identity document name data 314 .
- the diacritics name matching rules 310 describe constraints relating to how diacritics should or should not be considered for determining if identity source and recipient name data match.
- the diacritics name matching rules 310 may include various specific rules that result in identity document name data matching or not matching recipient name data based on diacritics name features.
- the diacritics name matching rules 310 include a rule to “ignore diacritics” in comparing identity document name data to recipient name data.
- a letter represented with a diacritic is considered to be equivalent to the same letter represented without the diacritic.
- both “ ⁇ ” and “ ⁇ grave over (C) ⁇ ” are equivalent to “C.”
- applying the “ignore diacritics” rule results to the name represented by the identity document name data 314 matching each name represented by matching recipient name data 316 .
- the identity document name data 314 is included in an identity document 312 and includes a first name “LUKA” and a last name “DON ⁇ I ⁇ tilde over (C) ⁇ ,” where the last name includes diacritics “ ⁇ ” and “ ⁇ grave over (C) ⁇ .”
- the matching recipient name data 316 includes names represented without the diacritics included in the last name of the data 314 but which still match the identity document name data 306 based on the diacritics name matching rules 310 .
- the matching recipient name data 316 includes names represented without any diacritics (e.g., “LUKA DONCIC”) and names represented with only some of the diacritics in the last name of data 314 (e.g., “LUKA DON ⁇ IC”).
- the diacritics name matching rules may include additional or alternative rules.
- the diacritics name matching rules 310 may ignore diacritics if the recipient name data does not include any diacritics (e.g., LUKA DONCIC) but require all diacritics to match if the recipient name data does include any diacritics.
- LUKA DON ⁇ IC would not be a matching recipient name because it is missing the diacritic “ ⁇ grave over (C) ⁇ .”
- the diacritics name matching rules may ignore certain diacritics and require others.
- FIG. 3C depicts an example application of transliteration name matching rules 320 to transliteration name features of identity document name data 324 .
- the transliteration name matching rules 320 describe constraints relating to how letters or symbols can be matched with equivalent transliterations for determining if identity source and recipient name data match.
- the transliteration name matching rules 320 may include various specific rules that result in identity document name data matching or not matching recipient name data.
- a computer system applying the transliteration name matching rules 320 uses a dictionary mapping a letter or symbol to one or more equivalent transliterations corresponding to the letter or symbol, or vice versa.
- the dictionary may be configured by the centralized document system 110 or a recipient entity, or may be provided by a third-party service.
- the transliteration name matching rules 320 may be configured to accept some transliterations as equivalent and not others.
- the identity document name data 324 is included in an identity document 322 and includes a first name “ANDERSON” and a last name “JÜRGEN,” where the last name includes a diacritic “Ü.”
- FIG. 3C further depicts matching recipient name data 316 that includes a name that does not include the diacritic “Ü,” but which still matches the identity document name data 324 based on the transliteration name matching rules 320 .
- the matching recipient name data 326 includes a name represented using a transliteration of the diacritic “Ü,” “UE”, which is equivalent to the diacritic “Ü” according to the transliteration name matching rules 320 .
- transliteration name matching rules 320 may be applied to other forms of transliteration for various letters or symbols, such as from transliterations from letters of one alphabet to another (e.g., between letters from the Latin, Greek, Cyrillic, Armenian alphabets, etc.), one syllabary to another (e.g., between symbols from the Japanese, Cherokee, or Vai syllabaries, etc.), one set of symbols to another (e.g., Chinese characters to an alphabetic of syllable symbol equivalent), any combination thereof, or any other appropriate form of transliteration.
- letters or symbols such as from transliterations from letters of one alphabet to another (e.g., between letters from the Latin, Greek, Cyrillic, Armenian alphabets, etc.), one syllabary to another (e.g., between symbols from the Japanese, Cherokee, or Vai syllabaries, etc.), one set of symbols to another (e.g., Chinese characters to an alphabetic of syllable symbol equivalent), any combination thereof, or
- FIG. 3D depicts an example application of name type name matching rules 330 to name type name features of identity document name data 334 .
- the name type name matching rules 330 describe constraints relating to how a number or type of matching names can be considered for determining if identity source and recipient name data match (e.g., a number of first names, last names, middle names, etc.).
- the name type name matching rules 330 may include various specific rules that result in identity document name data matching or not matching recipient name data based on name type name features.
- the name type name matching rules 330 may include one or more rules that require at least one matching first name, at least one matching last name, or both. In other cases, the name type name matching rules 330 may include additional or alternative rules.
- the name type name matching rules 330 include one or more rules that require at least one matching first name and one matching last name.
- the identity document name data 334 is included in an identity document 332 and includes a first name “DANIEL,” a middle name “GEORGE,” and a last name “BRADY,” where the first and middle name are separated by a comma.
- FIG. 3D further includes matching recipient name data 336 that includes names represented without a middle name but which still match the identity document name data 334 based on the name type name matching rules 330 .
- the matching recipient name data 336 includes a name “DANIEL BRADY” including only the first and last names of the name data 334 and no comma, and includes a name “DANIEL, BRADY” also including only the first and last names of the name data 334 separated by a comma.
- FIG. 3D further depicts the non-matching recipient name data 338 which do not match the identity document name data 334 based on the first and last name matching rules 330 .
- the non-matching recipient name data 338 includes the first and middle names from the name data 334 , but not the last name from the name data 334 .
- FIG. 3E depicts an example application of special character name matching rules 340 to name type features of identity document name data 344 .
- the special character name matching rules 340 describe constraints relating to how special characters should or should not be considered for determining if identity source and recipient name data match.
- Special characters are characters that do not impact the conceptual meaning of a name, such as various punctuation marks (e.g., periods or commas). Some punctuation marks, such as hyphens and apostrophes, may not be classified as special characters because they can impact the conceptual meaning of names, such as a hyphen being used to merge two names (typically referred to as a “double barreled name”).
- the special character name matching rules 340 may include various specific rules that result in identity document name data matching or not matching recipient name data based on special character name features.
- the special character matching rules 340 may include a rule “ignore special characters,” such as in the example depicted in FIG. 3E .
- the special character name matching rules 340 may include additional or alternative rules, such as only ignoring certain special characters or requiring others.
- the special character matching rules 340 may include a rule to “ignore special characters” in comparing identity document name data to recipient name data.
- the identity document name data 344 is included in an identity document 342 and includes a first name “FRANK,” a middle initial “J,” and a last name “KURTZ,” where the first name and middle initial are separated by a comma.
- FIG. 3E further includes matching recipient name data 346 that includes names represented without the same special characters as the identity document name data 334 but which still match the identity document name data 344 based on the special character name matching rules 340 .
- the matching recipient name data 346 includes a name “FRANK J.
- FIG. 3E further depicts the non-matching recipient name data 348 that do not match the identity document name data 344 based on the special character name matching rules 340 .
- the non-matching recipient name data 348 includes a name having the first name from the name data 334 and another name beginning with the middle initial of the identity document name data 344 , but not having the last name from the name data 344 .
- FIG. 3F depicts an example application of initial name matching rules 350 to initial name features of identity document name data 354 .
- the initial name matching rules 350 describe constraints relating to how initials (i.e., individual letters representing a name) can be matched to full names for determining if identity source and recipient name data match.
- the initial name matching rules 350 may include various specific rules that result in identity document name data matching or not matching recipient name data based on initial name features.
- the initial name matching rules 350 include one or more of the rules that “require a matching full last name and at least one matching full non-last name” (e.g., a first or middle name) in comparing identity document name to recipient name data.
- the identity document name data 354 is included in an identity document 352 and includes a first name “PETER,” a middle name “ANDREW,” and a last name “JOHNSON,” where the identity document name data 354 does not include any initials.
- FIG. 3F further includes matching recipient name data 356 that includes names having one initial and two full names but which still match the identity document name data 354 based on the initial name matching rules 350 .
- the matching recipient name data 356 includes a name “PETER A. JOHNSON” including a middle name initial and a name “P. ANDREW JOHNSON” including a first name initial.
- FIG. 3F further depicts non-matching recipient name data 358 representing names that do not match the identity document name data 354 based on the initial name matching rules 350 .
- the non-matching recipient name data 358 includes various names that do not include satisfy the initial name matching rules 350 .
- the initial name matching rules 350 may include additional or alternative rules, such as only requiring a full last name.
- FIG. 3G depicts an example application of suffix name matching rules 360 to suffix name features of identity document name data 364 .
- the suffix name matching rules 360 describe constraints relating to how suffixes can be considered for determining if identity source and recipient name data match.
- the suffix name matching rules 360 may include various specific rules that result in identity document name data matching or not matching recipient name data based on suffix name features.
- the suffix name matching rules 360 may include one or more of the rules to require an exact match for a suffix, to require one or more equivalent representations matching a suffix, to not permit conflicting suffixes, or to ignore suffixes altogether.
- the suffix name matching rules 360 include one or more rules that do not permit conflicting suffixes in comparing identity document name data to recipient name data.
- the identity document name data 364 is included in an identity document 362 and includes a first name “PETER,” a last name “JOHNSON,” and a representation of the suffix “Junior” as “JR.”
- FIG. 3G further includes matching recipient name data 366 that includes names having different representations of the suffix Junior or no suffix at all, but which match the identity document name data 364 based on the suffix name matching rules 360 .
- FIG. 3G further includes matching recipient name data 366 that includes names having different representations of the suffix Junior or no suffix at all, but which match the identity document name data 364 based on the suffix name matching rules 360 .
- 3G further depicts non-matching recipient name data 368 that do not match the identity document name data 364 based on the suffix name matching rules 360 .
- the non-matching recipient name data 368 includes a name having a representation of the suffix “Senior” as “SR,” which conflicts with the suffix Junior.
- FIG. 4 is a flowchart illustrating an embodiment of a process 400 for validating an identity of a recipient entity using name matching rules.
- the process 400 is performed by the centralized document system 110 .
- some or all of the steps of the process 400 may be performed by other components of the system environment 100 , or may be performed in a different order than that depicted in FIG. 4 .
- the process 400 illustrated in FIG. 4 can include fewer, additional, or different steps than those described herein.
- the process 400 includes the centralized document system 110 providing 410 an agreement to a client device for execution by a client device.
- the centralized document system 110 may provide a document package generated by the originating entity 130 using the originating user device 135 to the recipient user device 145 for executing by the recipient entity 140 .
- the process 400 includes the centralized document system 110 receiving 420 recipient name data representing an identity claimed by a user of the client device and having a first name feature.
- the recipient name data may be included in a document package including the agreement provided to the client device. Additionally, or alternatively, the recipient name data may be associated with a user account accessed by the client device (e.g., a user account the client device is logged in to).
- the first name feature may be various name features, such as one of the name features described above with reference to FIGS. 3A-G .
- the process 400 includes the centralized document system 110 obtaining 430 information describing an identity document corresponding to the user, where the information includes identity source name data having a second name feature that differs from the first name feature.
- the information may be an image of the identity document or information extracted from an image of the identity document (e.g., using computer vision techniques).
- the image of the identity document may be captured using the recipient user device 145 .
- the centralized document system 110 may alternatively (or additionally) receive identity source name data from other sources, such as a trusted service provider.
- the process 400 includes the centralized document system 110 performing 440 a name matching operation on the first and second name features to determine whether the first name feature and second correspond to the same name. For instance, the centralized document system 110 may apply one or more of the name matching rules described above with reference to FIGS. 3A-G to the first feature and the second name feature to determine whether the identity source name data and the recipient name data match. In some embodiments, the centralized document system 110 performs the name matching operation after determining that the first and second name feature differ.
- the centralized document system 110 may forgo performing the name matching operation and instead verify the identity of the user based upon the lack of differing name features.
- the process 400 includes the centralized document system 110 verifying 450 , responsive to determining the first name feature and the second name feature correspond to the same name, the identity of the user. After verifying the identity of the user, the centralized document system 110 authorizes the user of the client device to execute the agreement. In other cases, the centralized document system 110 may authorize the user of the client device to perform one or more other actions, such as accessing, viewing, modifying, or otherwise interacting with a document package.
- the centralized document system 110 determines that the first name feature and the second name feature do not correspond to the same name, the centralized document system 110 rejects the identity verification attempt.
- the first and second name features may be non-matching name features based on one or more name matching rules, as described above with reference to FIGS. 3A-3G .
- the centralized document system 110 may prevent the user of the client device from performing one or more actions, such as executing the agreement.
- a software module is implemented with a computer program product comprising a computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
- Embodiments may also relate to an apparatus for performing the operations herein.
- This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computing device selectively activated or reconfigured by a computer program stored in the computer.
- a computer program may be stored in a non-transitory, tangible computer readable storage medium, or any type of media suitable for storing electronic instructions, which may be coupled to a computer system bus.
- any computing systems referred to in the specification may include a single processor or may be architectures employing multiple processor designs for increased computing capability.
- Embodiments may also relate to a product that is produced by a computing process described herein.
- a product may comprise information resulting from a computing process, where the information is stored on a non-transitory, tangible computer readable storage medium and may include any embodiment of a computer program product or other data combination described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Document Processing Apparatus (AREA)
Abstract
Description
- This disclosure relates generally to electronic document management, and more specifically to verifying entity identities for interacting with documents in a document management system.
- Document management systems manage electronic documents for various entities (e.g., people, companies, organizations). Such electronic documents may include various types of agreements that can be executed (e.g., electronically signed) by entities, such as non-disclosure agreements, indemnity agreements, purchase orders, lease agreements, employment contracts, etc. Document management systems may employ techniques to verify an identity of an entity before allowing the entity to interact with a document, such as to execute an agreement. For example, conventional document management systems may receive trusted identity information from a user attempting to interact with a document and use the trusted identity information to verify an identity claimed by the user. For example, identity information may be extracted from a government issued form of identification, such as a driver license or passport.
- However, conventional systems fail to accurately validate user identities in cases where identity information differs from an expected result (e.g., a claimed identity). For example, conventional systems fail to recognize alternative representations of the same name. Due to these failings, conventional systems prevent users that are accurately claiming an identity from interacting with documents or taking other actions. As such, improved techniques for verifying user identities for interacting documents are needed.
- A document management system performs name matching operations to validate an identity claimed by a recipient of a document. In particular, the document management compares name data obtained from an identity data source with name data corresponding to a recipient entity of a document (e.g., an individual person, organization, or company) to determine whether name features of the identity source name data and recipient name data match. The name matching operations performed by the document management system may include applying a set of name matching rules to the identity source name data and the recipient name data to determine whether features that differ between the identity source name data and the recipient name data are acceptable alternative representations. For instance, name data may have differing letter cases (e.g., capital or lowercase letters), differing use of diacritics (e.g., e vs é), differing use of transliterations (e.g., Juergen vs Jürgen), differing use of first, middle, or last names), or other differences that may be acceptable alternatives according to the set of name matching rules. Identity source name data may be received from a variety of identity data sources, such as being extracted from an identity document of a user or received from a trusted service provider or other suitable provider of identity information.
- If the document management system successfully verifies an identity claimed by the recipient entity by performing the name matching operations, the document management system may authorize the recipient entity to perform one or more actions relevant to a received document, such as executing an agreement represented by the document (e.g., electronically signing the document). Alternatively, if the document management system does not successfully verify the identity claimed by the recipient entity, the document management system may prevent the recipient entity from performing actions relevant to the received document.
-
FIG. 1 is a block diagram of a system environment in which a centralized document system operates, according to one embodiment. -
FIG. 2 is a block diagram of a centralized document system, according to one embodiment. -
FIG. 3A depicts an example application of case sensitivity name matching rules to letter case name features of identity document name data, according to one embodiment. -
FIG. 3B depicts an example application of diacritics name matching rules to diacritic name features of identity document name data, according to one embodiment. -
FIG. 3C depicts an example application of transliteration name matching rules to transliteration name features of identity document name data, according to one embodiment. -
FIG. 3D depicts an example application of name type name matching rules to name type name features of identity document name data, according to one embodiment. -
FIG. 3E depicts an example application of special character name matching rules to name type features of identity document name data, according to one embodiment. -
FIG. 3F depicts an example application of initial name matching rules to initial name features of identity document name data, according to one embodiment. -
FIG. 3G depicts an example application of suffix name matching rules to suffix name features of identity document name data, according to one embodiment. -
FIG. 4 is a flowchart illustrating a process for validating an identity of a recipient entity using name matching rules, according to one embodiment. - The figures depict various embodiments for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
- The Figures (FIGS.) and the following description relate to preferred embodiments by way of illustration only. It should be noted that from the following discussion, alternative embodiments of the structures and methods disclosed herein will be readily recognized as viable alternatives that may be employed without departing from the principles of what is claimed.
- Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality. The figures depict embodiments of the disclosed system (or method) for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
- A system environment enables an originating entity to create and send documents to one or more recipient entities for negotiation, collaborative editing, electronic execution (e.g., electronic signature), automation of contract fulfilment, archival, and analysis, among other tasks. Within the system environment, a recipient entity may review content or terms presented in a digital document, and in response to agreeing to the content or terms, can electronically execute the document. In some embodiments, in advance of the execution of the documents, the originating entity may generate a document package to provide to the one or more recipient entities. The document package includes at least one document to be executed by one or more recipient entities. In some embodiments, the document package may also include one or more permissions defining actions the one or more recipient entities can perform in association with the document package. In some embodiments, the document package may also identify tasks the one or more recipient entities are to perform in association with the document package. In some embodiments, the document package may include name matching rules for verifying an identity of an entity claiming to be one of the one or more recipient entities for a document, such as name matching rules configured by the originating entity.
- The system environment described herein can be implemented within a centralized document system, an online document system, a document management system, or any type of digital management platform. It should be noted that although description may be limited in certain contexts to a particular environment, this is for the purposes of simplicity only, and in practice the principles described herein can apply more broadly to the context of any digital management platform. Examples can include but are not limited to online signature systems, online document creation and management systems, collaborative document and workspace systems, online workflow management systems, multi-party communication and interaction platforms, social networking systems, marketplace and financial transaction management systems, or any suitable digital transaction management platform. It should also be noted that “centralized document system”, “document management system”, and other similar terminology are used interchangeably herein.
- The processes described herein, in some implementations, provide a means for the one or more recipient entities to verify their identity to perform one or more actions in relation to a document package, such as executing an agreement, accessing a document, modifying a document, or any other suitable action. In particular, the centralized document system facilitates a name matching process wherein name data received from an identity data source (identity source name data) is compared to name data corresponding to a recipient entity (recipient name data). As an example, recipient name data may be included in a document package. The name matching process includes one or more name matching operations whereby features of the identity source name data and recipient name data are compared. A name matching operation may be performed by applying one or more name matching rules of a set of name matching rules to relevant name features. In this case, the name matching rules describe constraints for determining whether a name feature of the recipient name data is an allowed alternative representation of a name feature of the identity source name data, or vice versa. Particular examples of name matching rules are described in detail below with reference to
FIGS. 3A-G . -
FIG. 1 is a block diagram of a system environment in which a centralized document system operates, according to one embodiment. Thesystem environment 100 shown byFIG. 1 comprises acentralized document system 110, anetwork 120, an originatingentity 130 associated with an originating user device 135, a recipient entity 140 associated with a recipient user device 145. In alternative configurations, different or additional components may be included in thesystem environment 100. - The
centralized document system 110 is a computer system (or group of computer systems) for storing and managing documents or document packages (e.g., envelopes) for various entities. Using thecentralized document system 110, entities can collaborate to create, edit, review, negotiate, and execute documents. During execution of one or more documents, thecentralized document system 110 provides a means for generating and modifying a document package (also referred to as a document envelope). The document package may include at least one document for execution. Thecentralized document system 110 may provide the at least one document (e.g., a contract, agreement, purchase order, or other suitable document) in which terms have been agreed upon by two or more entities (e.g., by two or more individual users or organizations) to a recipient entity 140 for execution, as described above. Thecentralized document system 110 may generate the document package per a request from an originatingentity 130. In some implementations, the document package may additionally include a set of document permissions. Thecentralized document system 110 may provide a means for the recipient entity 140 to request to assign the set of document permissions to a second recipient entity (e.g., within a same or different organization). In other implementation, thecentralized document system 110 may scan the document package (including the document) to determine whether the document package includes a document of a particular type, and if so, may provide the document package to additional recipient entities not originally specified to receive the document package. In other implementations, thecentralized document system 110 modifies the document package to be sent to a substitute recipient entity based on the original recipient entity being unavailable. - The
centralized document system 110 can be a server, server group or cluster (including remote servers), or another suitable computing device or system of devices. In some implementations, thecentralized document system 110 can communicate with user devices (e.g., the originating user device 135 or the recipient user device 145) over thenetwork 120 to receive instructions and send document packages (or other information) for viewing on user devices. Thecentralized document system 110 will be discussed in further detail with respect toFIG. 2 . - The
network 120 transmits data within thesystem environment 100. Thenetwork 120 may comprise any combination of local area or wide area networks, using both wired or wireless communication systems, such as the Internet. In some embodiments, thenetwork 120 transmits data over a single connection (e.g., a data component of a cellular signal, or Wi-Fi, among others), or over multiple connections. In some embodiments, thenetwork 120 uses standard communications technologies or protocols. For example, thenetwork 120 includes communication links using technologies such as Ethernet, 802.11, 3G, 4G, code division multiple access (CDMA), digital subscriber line (DSL), and the like. Data exchanged over thenetwork 120 may be represented using any suitable format, such as hypertext markup language (HTML) or extensible markup language (XML). In some embodiments, thenetwork 120 may include encryption capabilities to ensure the security of customer data. For example, encryption technologies may include secure sockets layers (SSL), transport layer security (TLS), virtual private networks (VPNs), and Internet Protocol security (IPsec), among others. - Through the
network 120, thecentralized document system 110 can communicate with user devices associated with entities (e.g., the originating user device 135 or the recipient user device 145). An entity can represent an individual user, group, organization, or company that is able to interact with document packages (or other content) generated on or managed by thecentralized document system 110. Each entity can be associated with a username, email address, full or partial legal name, or other identifier that can be used by thecentralized document system 110 to identify the entity and to control the ability of the entity to view, modify, execute, or otherwise interact with document packages managed by thecentralized document system 110. In some implementations, entities can interact with thecentralized document system 110 through a user account with thecentralized document system 110 and one or more user devices accessible to that user entity. - In the embodiment of
FIG. 1 , an originatingentity 130 creates the document package via thecentralized document system 110. The document package is sent by thecentralized document system 110 for review and execution by the recipient entity 140. As described in greater detail below with reference toFIG. 2 , the recipient entity 140 may be associated with recipient name data representing an identity of an individual corresponding to the recipient entity. For instance, the individual may be s a user having a user account with thecentralized document system 110. - The originating user device 135 and the recipient user device 145 are computing devices capable of receiving user input as well as transmitting to, or receiving data from, the
centralized document system 110 via thenetwork 120. For example, the user devices 135 or 145 can be a desktop or a laptop computer, a smartphone, tablet, or another suitable device. The user devices 135 or 145 are configured to communicate via the network 120 (for example, with the centralized document system 110). In one embodiment, the user device 135 or 145 executes an application allowing a user of the user device to interact with thecentralized document system 110. For example, the user devices 135 or 145 can execute a browser application to enable interaction between the user device and thecentralized document system 110 via thenetwork 120. In some embodiments, a single entity can be associated with multiple user devices, or one user device can be shared between multiple entities who may, for example, log into a personal account on the user device to access thecentralized document system 110. - The
identity data source 150 is a trusted source of name data that can be used to verify an identity of the recipient entity 140 (e.g., a user) to execute a received document. In an exemplary embodiment, theidentity data source 150 is an identity document for an individual user of the recipient user device 145, such as a driver's license, a passport, or other form of government issued identification. In this case, the recipient entity 140 may obtain an image of the identity document to provide to thecentralized document system 110, such as by using a camera component of the recipient user device 145 to capture the image. The recipient user device 145, thecentralized document system 110, or a third-party system may process the image of the identity document to extract identity source name data. In the same or different embodiments, theidentity data source 150 may be a trusted service provider storing identity information for the recipient entity 140, such as a private or governmental database storing identity information corresponding to one or more individuals. In this case, the recipient device 145 may obtain identity source name data from the trusted service provider for providing to thecentralized document system 110 or authorize the trusted service provider to provide identity source name data directly to thecentralized document system 110. Although theidentity data source 150 is connected to the recipient user device 145 in the embodiment ofFIG. 1 , this is done for the purpose of illustration only, and in various embodiments theidentity data source 150 may be accessed by, or communicate with, any components of thesystem environment 100. -
FIG. 2 is a block diagram of acentralized document system 110, according to one embodiment. Components of thecentralized document system 110 may be a combination of hardware and software. In the embodiment shown inFIG. 2 , thecentralized document system 110 includes anaccount data store 210, anenvelope data store 220, anenvelope generation module 230, anenvelope modification module 240, anidentity verification module 250, and aninterface module 260. In other embodiments, thecentralized document system 110 may include fewer or additional components that are not shown inFIG. 2 . For example, conventional components such as network interfaces, security functions, load balancers, failover servers, management and network operations consoles, and the like are not shown so as to not obscure the details of the system architecture. The functions of thecentralized document system 110 may be distributed among the components in a different manner than described. - The
account data store 210 is a file storage system, database, set of databases, or other data storage system storing information associated with accounts of thecentralized document system 110. Entities may be associated with one or more accounts with thecentralized document system 110. In some embodiments, a parent entity may be associated with a parent account (e.g., an organization) and a set of child entities of the parent entity (e.g., employees of an organization) may be associated with a user account. For example, the originatingentity 130 or the recipient entity 140 may have corresponding parent accounts or user accounts with thecentralized document system 110. The parent account or user accounts may be associated with a policy or an organization chart for an entity. A policy for an entity is a system of principles that guide certain processes or workflows for the entity. For example, a policy may dictate which recipient entities are to receive document packages and a set of tasks the recipient entities are to perform in relation to the document package or a set of permissions the recipient entities may be subject to in relation to the document package. In some embodiments, the policy specifies a set of name matching rules to be used to verify the identities of recipient entities (e.g., in order to execute agreements), as described in greater detail below with reference to theidentity verification module 250. In some embodiments, the policy specify criteria that must be satisfied for an entity to be authorized to access or modify the document package, such as threshold number or percentage of name matching rules that must be satisfied to verify the identity of a recipient entity. In some embodiments, the policy specifies acting entities and corresponding sets of tasks for the acting entities to perform in relation to the document package based on document types or types of document content of the one or more documents included in the document package. In some embodiments, the policy specifies one or more thresholds corresponding to one or more types of document content (e.g., a payment amount, a payment term, etc.). For example, a policy may specify a threshold payment amount and corresponding acting entities and sets of tasks for the acting entities to perform if a payment amount within a document package exceeds the threshold payment amount. The org chart may include a list of entities (e.g., including names, titles, roles, departments, direct reports, supervisors, teams, groups, etc.) within an organization. - Each user account associated with an entity may include information about the entity, such as information about the individual with access to the user account, age of the account, frequency of account use, log of past account transactions, and the like. Information about the individual with access to the account may include name data representing the individual's name (e.g., first name, last name, middle name, suffixes, nicknames, etc.), email address, organization name, title, role, department, and the like. The individual's title is a position title or job title held by the individual with an organization. The individual's role is a function that the individual fulfills within their organization. For example, a title may be “General Counsel” and a role may be reviewing and executing agreements. The individual's department is a group within the organization where the individual works. For example, a department may be operations, finance, sales, human resources, purchases, legal, and the like.
- The
envelope data store 220 is a file storage system, database, set of databases, or other data storage system storing information associated with document envelopes. Originating entities (e.g., the originating entity 130) provide one or more documents to recipient entities (e.g., the recipient entity 140) via envelopes. A document envelope (also referred to as a document package herein) can include at least one document for execution. The at least one document may have been previously negotiated by an originating entity and a recipient entity. And, as such, the document may be ready for execution upon the creation of an envelope. The document package may also include recipient information and document fields indicating which fields of the document need to be completed for execution (e.g., where the recipient entity 140 should sign, date, or initial the document). The recipient information may include contact information for a recipient entity (e.g., a name and email address). - In some embodiments, the document package may also include a set of permissions. The set of permissions may be assigned by an originating
entity 130. The set of permissions included in the document package define one or more actions that a recipient entity can perform with regard to the document package. The one or more actions may include adding one or more additional recipient entities to the document package, removing one or more recipient entities from the document package, updating an order in which two or more recipient entities receive the document package, updating one or more tasks of one or more recipient entities of the document package, adding one or more additional documents to the document package, removing one or more documents from the document package, providing a notification (e.g., “Documents within document package need careful review”) to one or more recipient entities about the document package, and the like. For example, the originatingentity 130 may set the following permissions for a document package: allow recipient entity 140 to add additional recipient entities, allow recipient entity 140 to remove one or more documents from the document package, allow recipient entity 140 to execute one or more documents, allow recipient entity 140 to modify one or more documents, and the like. - In some embodiments, the document package may also identify a first set of acting entities, and for each acting entity, the document package may also identify a first set of tasks that the acting entity is to perform with regard to the document package. The first set of tasks may define what each acting entity is to do and complete before the at least one document of the document package can be executed. The set of tasks may include reviewing the at least one document, initialing the at least one document, signing the at least one document, providing information for the at least one document, and the like.
- The
envelope generation module 230 may generate envelopes for an originating entity to send to a recipient entity. For example, theenvelope generation module 230 may generate an envelope for the originatingentity 130 to send to the recipient entity 140. In a specific implementation, theenvelope generation module 230 may receive instructions from the originatingentity 130 to generate an envelope (also referred to as a document package) that will be sent to one or more recipient entities. Theenvelope generation module 230 may generate a document package that includes at least one document for execution (e.g., an agreement). In an implementation, theenvelope generation module 230 may generate a document package that may also include a set of permissions corresponding to each document of the document package. In another implementation, theenvelope generation module 230 may generate a document package that identifies a first set of acting entities and for each acting entity a first set of tasks that each acting entity of the first set of acting entities is to perform with regards to the document package (for instance before the documents of the document package can be executed). - In some embodiments, the
envelope generation module 230 may provide the document package to one or more recipient entities after the document package has been generated per a request from an originating entity. In alternative embodiments, theenvelope generation module 230 may provide the document package to one or more recipient entities after the document package has been modified by theenvelope modification module 240. - The
envelope modification module 240 manages modifications made to a document package. In some embodiments, the modifications are requested by a recipient entity (e.g., a user of the recipient user device 145) and provided to an originating entity for approval (e.g., by a user of the originating user device 135). In some embodiments, the modifications are automatically applied by theenvelope modification module 240 after being requested by a user (such as the recipient entity 140). Modifications to a document package may include a variety of actions, such as executing a document (e.g., via electronic signature) or changing document permissions for the document package (e.g., assigning document permissions to an additional recipient entity). Theenvelope modification module 240 may authorize a recipient entities to access or modify document packages before performing modifications or other actions requested by the recipient entity. In particular, theenvelope modification module 240 may verify an identity of a recipient entity before allowing the recipient entity to make modifications or perform other actions on a document package. For instance, by communicating with theidentity verification module 250, as described in greater detail below. - In some embodiments, the
envelope modification module 240 applies one or more policies described by a document package to authorize a recipient entity to make modifications or perform other actions on the document package. For instance, theenvelope modification module 240 may apply one of the policies described above with relation to theaccount data store 210. Theenvelope modification module 240 may apply multiple policies for authorizing a recipient entity to modify a document package, where some or all of the policies may need to be successfully satisfied in order for a recipient entity to e authorized. In this case, theenvelope modification module 240 may use various processes or criteria to evaluate the results of applying the multiple policies, such as by weighting the policies by relative priority or determining whether the satisfied policies meet a threshold criteria (e.g., a number of type of satisfied policies). - The
identity verification module 250 verifies identities of recipient entities of document packages, e.g., for authorizing the recipient entities to modify the document packages. In particular, theidentity verification module 250 receives identity source name data from an identity data source (e.g., the identity data source 150) and compares the identity source name data to recipient name data corresponding to the recipient entity (e.g., name data included in the document package) by performing one or more name matching operations on name features of the identity source name data and the recipient name data. In embodiments, the one or more name matching operations include applying a set of name matching rules to the name features. As described above, the name matching rules describe constraints for determining whether a name feature of the recipient name data is an allowed alternative representation of a name feature of the identity source name data, or vice versa. The name matching rules may be included in the document package or otherwise configured by an originating entity for the document package. The name matching rules may include rules relating to different types of name features, such as letter cases, diacritics, transliterations, name types (e.g., first, middle, last), special characters (e.g., initials), suffixes, etc. Applying name matching rules relating to various types of name features are described in greater detail below with reference toFIGS. 3A-F . - In some embodiments the
identity verification module 250 may initially compare the identity source name data to the recipient name data to determine whether they are an exact match or have one or more differing name features. In the case of an exact match, theidentity verification module 250 may verify the identity of the recipient entity. In the case of differing name features, theidentity verification module 250 may apply the name matching rules to determine whether the identity source name data and the recipient name data match despite the one or more differing name features, such as due to the one or more differing name features being acceptable equivalent representations based on the name matching rules. If theidentity verification module 250 determines the identity source and recipient name data match based on the initial comparison or by applying the name matching rules, theidentity verification module 250 may verify the identity of the recipient entity. Alternatively, if theidentity verification module 250 determines the identity source and recipient name data do not match based on the initial comparison or by applying the name matching rules, theidentity verification module 250 rejects the identity verification attempt. In this case, thecentralized document system 110 may not authorize the recipient entity to perform one or more actions on a relevant document package, such as executing an agreement. - In some embodiments, the
identity verification module 250 prompts a recipient entity to provide identity source name data for confirming the recipient entity's identity. In particular, theidentity verification module 250 or theinterface module 260 may provide an interface to a recipient user device (e.g., the recipient user device 145) describing one or more options for a user of the recipient user device to provide identity source name data. The options for providing identity source name data may include providing an image of an identity document or requesting identity source name data from a trusted service provider, as described above with reference to theidentity data source 150. If an image of an identity document is used as an identity data source, theidentity verification module 250 may process the image to extract identity source name data. For example, theidentity verification module 250 may apply a trained machine learning model to the image to extract the identity source name data. The model may be trained by thecentralized document system 110 or may be trained or otherwise provided by a third-party system (e.g., a third-party image processing service). - The
interface module 260 may generate user interfaces allowing entities to interact with document packages managed by thecentralized document system 110. For example, theinterface module 260 may generate a user interface for an originatingentity 130 to generate a document package. In another example, theinterface module 260 may generate a user interface for a recipient entity 140 to view a document package. In some implementations, theinterface module 260 may provide a user interface enabling a recipient entity 140 to modify a document package. For example, theinterface module 260 may display a listing of the one or more recipient entities 140 of the document package to a recipient entity 140 on an electronic display of a user device 145. Theinterface module 260 may provide one or more interface elements (e.g., links, buttons, checkboxes, etc.) on the electronic display for the recipient entity 140 to select in order to request to assign a set of document permissions to an additional recipient entity 140. In some implementations, theinterface module 260 may generate a user interface for displaying a notification to a recipient entity 140 that an additional recipient entity 140 cannot be assigned the set of document permissions. -
FIGS. 3A-F depict example applications of name matching rules corresponding to different types of name features of identity source name data included in identity documents. The examples depicted inFIGS. 3A-F are provided for the purpose of illustration only, and other types of identity documents or name features may be used by the centralized document to verify an identity of recipient entities. For instance, other types of identity documents than driver licenses may be used. The identity source name data included in the identity documents depicted inFIGS. 3A-F may be extracted from an image of theidentity document 302, as described above with reference to theidentity data source 150 and theidentity verification module 250. Similarly, the examples of matching and non-matching recipient name data depicted inFIGS. 3A-F may be included in a document package received by a recipient entity or otherwise associated with a recipient entity. Note that although the matching recipient name data depicted inFIGS. 3A-F does not include names that exactly match the identity document name data, this is done in order to illustrate sets of name data that match despite having differing name features. One skilled in the art will appreciate that recipient name data and identity document name data that do not have any differing name features can also be considered to match. -
FIG. 3A depicts an example application of case sensitivity name matching rules 300 to letter case name features of identitydocument name data 304. The case sensitivity name matching rules 300 describe constraints relating to how letter case should or should not be considered for determining if identity source and recipient name data match. The case sensitivity name matching rules 300 may include various specific rules that result in identity document name data matching or not matching recipient name data. - In the example shown in
FIG. 3A , the case sensitivity name matching rules 300 include a rule to “ignore case sensitivity” in comparing identity document name data to recipient name data. For instance, according to the “ignore case sensitivity rule” both “M” and “m” are equivalent. As such, applying the “ignore case sensitivity” rule results in the name represented by the identitydocument name data 304 matching each name represented by matchingrecipient name data 306. In particular, the identitydocument name data 304 is included in anidentity document 302 and includes a first name “MICHAEL” and a last name “REAVES,” both of which are represented using all capital letters. The matchingrecipient name data 306 includes names represented with different letter case name features than the identitydocument name data 304 but which still match the identitydocument name data 306 based on the case sensitivity name matching rules 300. In other cases, the case sensitivity name matching rules may include additional or alternative rules, such as ignoring case sensitivity for a subset of letters. -
FIG. 3B depicts an example application of diacritics name matchingrules 310 to diacritic name features of identitydocument name data 314. The diacritics name matchingrules 310 describe constraints relating to how diacritics should or should not be considered for determining if identity source and recipient name data match. The diacritics name matching rules 310 may include various specific rules that result in identity document name data matching or not matching recipient name data based on diacritics name features. - In the example shown in
FIG. 3B , the diacritics name matching rules 310 include a rule to “ignore diacritics” in comparing identity document name data to recipient name data. In this case, a letter represented with a diacritic is considered to be equivalent to the same letter represented without the diacritic. For instance, according to the “ignore diacritics” rule both “Č” and “{grave over (C)}” are equivalent to “C.” As such, applying the “ignore diacritics” rule results to the name represented by the identitydocument name data 314 matching each name represented by matchingrecipient name data 316. In particular, the identitydocument name data 314 is included in anidentity document 312 and includes a first name “LUKA” and a last name “DONČI{tilde over (C)},” where the last name includes diacritics “Č” and “{grave over (C)}.” The matchingrecipient name data 316 includes names represented without the diacritics included in the last name of thedata 314 but which still match the identitydocument name data 306 based on the diacritics name matching rules 310. In particular, the matchingrecipient name data 316 includes names represented without any diacritics (e.g., “LUKA DONCIC”) and names represented with only some of the diacritics in the last name of data 314 (e.g., “LUKA DONČIC”). In other cases, the diacritics name matching rules may include additional or alternative rules. For example, the diacritics name matching rules 310 may ignore diacritics if the recipient name data does not include any diacritics (e.g., LUKA DONCIC) but require all diacritics to match if the recipient name data does include any diacritics. In this case, LUKA DONČIC would not be a matching recipient name because it is missing the diacritic “{grave over (C)}.” In other examples the diacritics name matching rules may ignore certain diacritics and require others. -
FIG. 3C depicts an example application of transliteration name matching rules 320 to transliteration name features of identitydocument name data 324. The transliteration name matching rules 320 describe constraints relating to how letters or symbols can be matched with equivalent transliterations for determining if identity source and recipient name data match. The transliteration name matching rules 320 may include various specific rules that result in identity document name data matching or not matching recipient name data. In some embodiments, a computer system applying the transliteration name matching rules 320 (e.g., the identity verification module 250) uses a dictionary mapping a letter or symbol to one or more equivalent transliterations corresponding to the letter or symbol, or vice versa. In this case, the dictionary may be configured by thecentralized document system 110 or a recipient entity, or may be provided by a third-party service. In the same or different embodiments, the transliteration name matching rules 320 may be configured to accept some transliterations as equivalent and not others. - In the example scenario depicted by
FIG. 3C , the identitydocument name data 324 is included in anidentity document 322 and includes a first name “ANDERSON” and a last name “JÜRGEN,” where the last name includes a diacritic “Ü.”FIG. 3C further depicts matchingrecipient name data 316 that includes a name that does not include the diacritic “Ü,” but which still matches the identitydocument name data 324 based on the transliteration name matching rules 320. In particular, the matchingrecipient name data 326 includes a name represented using a transliteration of the diacritic “Ü,” “UE”, which is equivalent to the diacritic “Ü” according to the transliteration name matching rules 320. Although a transliteration of a diacritic is exemplified inFIG. 3C , in the same or difference cases the transliteration name matching rules 320 may be applied to other forms of transliteration for various letters or symbols, such as from transliterations from letters of one alphabet to another (e.g., between letters from the Latin, Greek, Cyrillic, Armenian alphabets, etc.), one syllabary to another (e.g., between symbols from the Japanese, Cherokee, or Vai syllabaries, etc.), one set of symbols to another (e.g., Chinese characters to an alphabetic of syllable symbol equivalent), any combination thereof, or any other appropriate form of transliteration. -
FIG. 3D depicts an example application of name type name matching rules 330 to name type name features of identitydocument name data 334. The name type name matching rules 330 describe constraints relating to how a number or type of matching names can be considered for determining if identity source and recipient name data match (e.g., a number of first names, last names, middle names, etc.). The name type name matching rules 330 may include various specific rules that result in identity document name data matching or not matching recipient name data based on name type name features. As an example, the name type name matching rules 330 may include one or more rules that require at least one matching first name, at least one matching last name, or both. In other cases, the name type name matching rules 330 may include additional or alternative rules. - In the example shown in
FIG. 3D , the name type name matching rules 330 include one or more rules that require at least one matching first name and one matching last name. In particular, the identitydocument name data 334 is included in anidentity document 332 and includes a first name “DANIEL,” a middle name “GEORGE,” and a last name “BRADY,” where the first and middle name are separated by a comma.FIG. 3D further includes matchingrecipient name data 336 that includes names represented without a middle name but which still match the identitydocument name data 334 based on the name type name matching rules 330. In particular, the matchingrecipient name data 336 includes a name “DANIEL BRADY” including only the first and last names of thename data 334 and no comma, and includes a name “DANIEL, BRADY” also including only the first and last names of thename data 334 separated by a comma.FIG. 3D further depicts the non-matchingrecipient name data 338 which do not match the identitydocument name data 334 based on the first and last name matching rules 330. In particular, the non-matchingrecipient name data 338 includes the first and middle names from thename data 334, but not the last name from thename data 334. -
FIG. 3E depicts an example application of special character name matching rules 340 to name type features of identitydocument name data 344. The special character name matching rules 340 describe constraints relating to how special characters should or should not be considered for determining if identity source and recipient name data match. Special characters are characters that do not impact the conceptual meaning of a name, such as various punctuation marks (e.g., periods or commas). Some punctuation marks, such as hyphens and apostrophes, may not be classified as special characters because they can impact the conceptual meaning of names, such as a hyphen being used to merge two names (typically referred to as a “double barreled name”). The special character name matching rules 340 may include various specific rules that result in identity document name data matching or not matching recipient name data based on special character name features. As an example, the special character matching rules 340 may include a rule “ignore special characters,” such as in the example depicted inFIG. 3E . In other cases, the special character name matching rules 340 may include additional or alternative rules, such as only ignoring certain special characters or requiring others. - In the example scenario depicted by
FIG. 3E , the special character matching rules 340 may include a rule to “ignore special characters” in comparing identity document name data to recipient name data. In particular, the identitydocument name data 344 is included in anidentity document 342 and includes a first name “FRANK,” a middle initial “J,” and a last name “KURTZ,” where the first name and middle initial are separated by a comma.FIG. 3E further includes matchingrecipient name data 346 that includes names represented without the same special characters as the identitydocument name data 334 but which still match the identitydocument name data 344 based on the special character name matching rules 340. In particular, the matchingrecipient name data 346 includes a name “FRANK J. KURTZ” including a period after the middle initial and a name “FRANK J KURTZ” that does not include any special characters.FIG. 3E further depicts the non-matchingrecipient name data 348 that do not match the identitydocument name data 344 based on the special character name matching rules 340. In particular, the non-matchingrecipient name data 348 includes a name having the first name from thename data 334 and another name beginning with the middle initial of the identitydocument name data 344, but not having the last name from thename data 344. -
FIG. 3F depicts an example application of initial name matching rules 350 to initial name features of identitydocument name data 354. The initial name matching rules 350 describe constraints relating to how initials (i.e., individual letters representing a name) can be matched to full names for determining if identity source and recipient name data match. The initial name matching rules 350 may include various specific rules that result in identity document name data matching or not matching recipient name data based on initial name features. - In the example scenario depicted by
FIG. 3F , the initial name matching rules 350 include one or more of the rules that “require a matching full last name and at least one matching full non-last name” (e.g., a first or middle name) in comparing identity document name to recipient name data. In particular, the identitydocument name data 354 is included in anidentity document 352 and includes a first name “PETER,” a middle name “ANDREW,” and a last name “JOHNSON,” where the identitydocument name data 354 does not include any initials.FIG. 3F further includes matchingrecipient name data 356 that includes names having one initial and two full names but which still match the identitydocument name data 354 based on the initial name matching rules 350. In particular, the matchingrecipient name data 356 includes a name “PETER A. JOHNSON” including a middle name initial and a name “P. ANDREW JOHNSON” including a first name initial.FIG. 3F further depicts non-matchingrecipient name data 358 representing names that do not match the identitydocument name data 354 based on the initial name matching rules 350. In particular, the non-matchingrecipient name data 358 includes various names that do not include satisfy the initial name matching rules 350. In other cases, the initial name matching rules 350 may include additional or alternative rules, such as only requiring a full last name. -
FIG. 3G depicts an example application of suffix name matching rules 360 to suffix name features of identitydocument name data 364. The suffix name matching rules 360 describe constraints relating to how suffixes can be considered for determining if identity source and recipient name data match. The suffix name matching rules 360 may include various specific rules that result in identity document name data matching or not matching recipient name data based on suffix name features. As an example, the suffix name matching rules 360 may include one or more of the rules to require an exact match for a suffix, to require one or more equivalent representations matching a suffix, to not permit conflicting suffixes, or to ignore suffixes altogether. - In the example scenario depicted by
FIG. 3G , the suffix name matching rules 360 include one or more rules that do not permit conflicting suffixes in comparing identity document name data to recipient name data. In particular, the identitydocument name data 364 is included in anidentity document 362 and includes a first name “PETER,” a last name “JOHNSON,” and a representation of the suffix “Junior” as “JR.”FIG. 3G further includes matchingrecipient name data 366 that includes names having different representations of the suffix Junior or no suffix at all, but which match the identitydocument name data 364 based on the suffix name matching rules 360.FIG. 3G further depicts non-matchingrecipient name data 368 that do not match the identitydocument name data 364 based on the suffix name matching rules 360. In particular, the non-matchingrecipient name data 368 includes a name having a representation of the suffix “Senior” as “SR,” which conflicts with the suffix Junior. -
FIG. 4 is a flowchart illustrating an embodiment of aprocess 400 for validating an identity of a recipient entity using name matching rules. In the embodiment shown inFIG. 4 , theprocess 400 is performed by thecentralized document system 110. In other embodiments, some or all of the steps of theprocess 400 may be performed by other components of thesystem environment 100, or may be performed in a different order than that depicted inFIG. 4 . Additionally, in other embodiments, theprocess 400 illustrated inFIG. 4 can include fewer, additional, or different steps than those described herein. - The
process 400 includes thecentralized document system 110 providing 410 an agreement to a client device for execution by a client device. For instance, thecentralized document system 110 may provide a document package generated by the originatingentity 130 using the originating user device 135 to the recipient user device 145 for executing by the recipient entity 140. - The
process 400 includes thecentralized document system 110 receiving 420 recipient name data representing an identity claimed by a user of the client device and having a first name feature. The recipient name data may be included in a document package including the agreement provided to the client device. Additionally, or alternatively, the recipient name data may be associated with a user account accessed by the client device (e.g., a user account the client device is logged in to). The first name feature may be various name features, such as one of the name features described above with reference toFIGS. 3A-G . - The
process 400 includes thecentralized document system 110 obtaining 430 information describing an identity document corresponding to the user, where the information includes identity source name data having a second name feature that differs from the first name feature. As an example, the information may be an image of the identity document or information extracted from an image of the identity document (e.g., using computer vision techniques). In this case, the image of the identity document may be captured using the recipient user device 145. As described above with reference to theidentity data source 150, in other scenarios than that described inFIG. 4 thecentralized document system 110 may alternatively (or additionally) receive identity source name data from other sources, such as a trusted service provider. - The
process 400 includes thecentralized document system 110 performing 440 a name matching operation on the first and second name features to determine whether the first name feature and second correspond to the same name. For instance, thecentralized document system 110 may apply one or more of the name matching rules described above with reference toFIGS. 3A-G to the first feature and the second name feature to determine whether the identity source name data and the recipient name data match. In some embodiments, thecentralized document system 110 performs the name matching operation after determining that the first and second name feature differ. In this case, if thecentralized document system 110 instead determines that identity name data and the recipient name data do not have any differing name features (e.g., they are an exact match), thecentralized document system 110 may forgo performing the name matching operation and instead verify the identity of the user based upon the lack of differing name features. - The
process 400 includes thecentralized document system 110 verifying 450, responsive to determining the first name feature and the second name feature correspond to the same name, the identity of the user. After verifying the identity of the user, thecentralized document system 110 authorizes the user of the client device to execute the agreement. In other cases, thecentralized document system 110 may authorize the user of the client device to perform one or more other actions, such as accessing, viewing, modifying, or otherwise interacting with a document package. - Alternatively, if the
centralized document system 110 determines that the first name feature and the second name feature do not correspond to the same name, thecentralized document system 110 rejects the identity verification attempt. For example, the first and second name features may be non-matching name features based on one or more name matching rules, as described above with reference toFIGS. 3A-3G . In this case, thecentralized document system 110 may prevent the user of the client device from performing one or more actions, such as executing the agreement. - The foregoing description of the embodiments has been presented for the purpose of illustration; it is not intended to be exhaustive or to limit the patent rights to the precise forms disclosed. Persons skilled in the relevant art can appreciate that many modifications and variations are possible in light of the above disclosure.
- Some portions of this description describe the embodiments in terms of algorithms and symbolic representations of operations on information. These algorithmic descriptions and representations are commonly used by those skilled in the data processing arts to convey the substance of their work effectively to others skilled in the art. These operations, while described functionally, computationally, or logically, are understood to be implemented by computer programs or equivalent electrical circuits, microcode, or the like. Furthermore, it has also proven convenient at times, to refer to these arrangements of operations as modules, without loss of generality. The described operations and their associated modules may be embodied in software, firmware, hardware, or any combinations thereof.
- Any of the steps, operations, or processes described herein may be performed or implemented with one or more hardware or software modules, alone or in combination with other devices. In one embodiment, a software module is implemented with a computer program product comprising a computer-readable medium containing computer program code, which can be executed by a computer processor for performing any or all of the steps, operations, or processes described.
- Embodiments may also relate to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general-purpose computing device selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a non-transitory, tangible computer readable storage medium, or any type of media suitable for storing electronic instructions, which may be coupled to a computer system bus. Furthermore, any computing systems referred to in the specification may include a single processor or may be architectures employing multiple processor designs for increased computing capability.
- Embodiments may also relate to a product that is produced by a computing process described herein. Such a product may comprise information resulting from a computing process, where the information is stored on a non-transitory, tangible computer readable storage medium and may include any embodiment of a computer program product or other data combination described herein.
- Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the patent rights. It is therefore intended that the scope of the patent rights be limited not by this detailed description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of the embodiments is intended to be illustrative, but not limiting, of the scope of the patent rights, which is set forth in the following claims.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/246,447 US12165435B2 (en) | 2021-04-30 | 2021-04-30 | Identity verification in a document management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/246,447 US12165435B2 (en) | 2021-04-30 | 2021-04-30 | Identity verification in a document management system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20220350984A1 true US20220350984A1 (en) | 2022-11-03 |
US12165435B2 US12165435B2 (en) | 2024-12-10 |
Family
ID=83807589
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/246,447 Active 2042-02-24 US12165435B2 (en) | 2021-04-30 | 2021-04-30 | Identity verification in a document management system |
Country Status (1)
Country | Link |
---|---|
US (1) | US12165435B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116738396A (en) * | 2023-08-08 | 2023-09-12 | 广州天地林业有限公司 | Artificial intelligence-based landmark quasi document input method and system |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100011428A1 (en) * | 2006-05-10 | 2010-01-14 | Margaret Atwood | System, method and computer program, for enabling entry into transactions on a remote basis |
US20120016663A1 (en) * | 1998-03-25 | 2012-01-19 | International Business Machines Corporation | Identifying related names |
US20140244234A1 (en) * | 2013-02-26 | 2014-08-28 | International Business Machines Corporation | Chinese name transliteration |
US20150181405A1 (en) * | 2013-12-20 | 2015-06-25 | Google Inc. | Identifying an Entity Associated with Wireless Network Access Point |
US20170024697A1 (en) * | 2015-07-22 | 2017-01-26 | International Business Machines Corporation | Maintaining a custodian directory by analyzing documents |
US20180181964A1 (en) * | 2015-02-13 | 2018-06-28 | Yoti Holding Limited | Secure Electronic Payment |
US20190294594A1 (en) * | 2018-03-21 | 2019-09-26 | Skyrock Partners, LLC | Identity Data Enhancement |
US20190303371A1 (en) * | 2018-03-30 | 2019-10-03 | Experian Health, Inc. | Methods and systems for improved entity recognition and insights |
US10726488B2 (en) * | 2012-11-27 | 2020-07-28 | Metropolitan Life Insurance Co. | System and method for identifying and distributing matured policy proceeds |
US10853033B1 (en) * | 2017-10-11 | 2020-12-01 | Amperity, Inc. | Effectively fusing database tables |
US10896060B1 (en) * | 2020-01-14 | 2021-01-19 | Capital One Services, Llc | Resource monitor for monitoring long-standing computing resources |
US20210026974A1 (en) * | 2019-07-28 | 2021-01-28 | Bank Of America Corporation | Elastic virtual information access ecosystem |
US20210224419A1 (en) * | 2017-03-17 | 2021-07-22 | Mend VIP, Inc. | System and method for transferring data, scheduling appointments, and conducting conferences |
US20210320799A1 (en) * | 2018-08-17 | 2021-10-14 | Visa International Service Association | Secure data transfer system and method |
US11176180B1 (en) * | 2016-08-09 | 2021-11-16 | American Express Travel Related Services Company, Inc. | Systems and methods for address matching |
US11386394B2 (en) * | 2011-06-08 | 2022-07-12 | Workshare, Ltd. | Method and system for shared document approval |
US20220353092A1 (en) * | 2021-04-29 | 2022-11-03 | RiVidium, Inc. | System and Method for Secure Internet Communications |
-
2021
- 2021-04-30 US US17/246,447 patent/US12165435B2/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120016663A1 (en) * | 1998-03-25 | 2012-01-19 | International Business Machines Corporation | Identifying related names |
US20100011428A1 (en) * | 2006-05-10 | 2010-01-14 | Margaret Atwood | System, method and computer program, for enabling entry into transactions on a remote basis |
US11386394B2 (en) * | 2011-06-08 | 2022-07-12 | Workshare, Ltd. | Method and system for shared document approval |
US10726488B2 (en) * | 2012-11-27 | 2020-07-28 | Metropolitan Life Insurance Co. | System and method for identifying and distributing matured policy proceeds |
US20140244234A1 (en) * | 2013-02-26 | 2014-08-28 | International Business Machines Corporation | Chinese name transliteration |
US20150181405A1 (en) * | 2013-12-20 | 2015-06-25 | Google Inc. | Identifying an Entity Associated with Wireless Network Access Point |
US20180181964A1 (en) * | 2015-02-13 | 2018-06-28 | Yoti Holding Limited | Secure Electronic Payment |
US20170024697A1 (en) * | 2015-07-22 | 2017-01-26 | International Business Machines Corporation | Maintaining a custodian directory by analyzing documents |
US11176180B1 (en) * | 2016-08-09 | 2021-11-16 | American Express Travel Related Services Company, Inc. | Systems and methods for address matching |
US20210224419A1 (en) * | 2017-03-17 | 2021-07-22 | Mend VIP, Inc. | System and method for transferring data, scheduling appointments, and conducting conferences |
US10853033B1 (en) * | 2017-10-11 | 2020-12-01 | Amperity, Inc. | Effectively fusing database tables |
US20190294594A1 (en) * | 2018-03-21 | 2019-09-26 | Skyrock Partners, LLC | Identity Data Enhancement |
US20190303371A1 (en) * | 2018-03-30 | 2019-10-03 | Experian Health, Inc. | Methods and systems for improved entity recognition and insights |
US20210320799A1 (en) * | 2018-08-17 | 2021-10-14 | Visa International Service Association | Secure data transfer system and method |
US20210026974A1 (en) * | 2019-07-28 | 2021-01-28 | Bank Of America Corporation | Elastic virtual information access ecosystem |
US10896060B1 (en) * | 2020-01-14 | 2021-01-19 | Capital One Services, Llc | Resource monitor for monitoring long-standing computing resources |
US20220353092A1 (en) * | 2021-04-29 | 2022-11-03 | RiVidium, Inc. | System and Method for Secure Internet Communications |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116738396A (en) * | 2023-08-08 | 2023-09-12 | 广州天地林业有限公司 | Artificial intelligence-based landmark quasi document input method and system |
Also Published As
Publication number | Publication date |
---|---|
US12165435B2 (en) | 2024-12-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11721340B2 (en) | Personal information assistant computing system | |
US11588813B2 (en) | Systems and methods for biometric authentication using existing databases | |
US9626653B2 (en) | Document distribution and interaction with delegation of signature authority | |
US8484052B2 (en) | System and method for receiving and evaluating requests for insurance proposals | |
US11468326B2 (en) | High-risk passage automation in a digital transaction management platform | |
US20230064367A1 (en) | Retraining document-tagging machine-learned model based on anonymized data | |
US11863687B2 (en) | Post-completion action management in online document system | |
US20220365982A1 (en) | Document package merge in document management system | |
US20230032005A1 (en) | Event-driven recipient notification in document management system | |
US11494738B2 (en) | Re-engineering user login / registration process for job applicants | |
US12165435B2 (en) | Identity verification in a document management system | |
US20220245122A1 (en) | Document package modifications based on organization policies in a document management platform | |
US20220245592A1 (en) | Document package modifications based on entity unavailability in a document management platform | |
US20220245201A1 (en) | Document package modifications based on assigned permissions in a document management platform | |
US20230185793A1 (en) | Audit records monitoring using a blockchain structure | |
US12033007B2 (en) | Enforcing application programming interface limits in a document management system | |
US20240070380A1 (en) | Dynamic implementation of document management system capabilities in third party integrations | |
CN114362979B (en) | Method and system for managing application | |
WO2022164899A1 (en) | Document package modifications based on assigned permissions in a document management platform | |
US20230032995A1 (en) | Recipient notification recommendation in a document management system | |
US9722982B2 (en) | Unauthenticated access to artifacts in commerce networks | |
US20250126152A1 (en) | Detecting violations of data policies via dynamic classification of digital data objects | |
AU2021218011A1 (en) | Activity based compliance | |
WO2023009883A1 (en) | Event-driven recipient notification in a document management system | |
WO2024177796A1 (en) | System and methods for providing anonymous verified identify and session management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: DOCUSIGN, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BORDIER, RENAUD LOUIS;KOSTOVSKI, JOHN JAMES;MONTACUTELLI, EMMANUEL;AND OTHERS;SIGNING DATES FROM 20210614 TO 20210625;REEL/FRAME:056745/0299 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |