Patent classifications
G06V40/30
SECURE SIGNING METHOD, DEVICE AND SYSTEM
A record including an original document and a modification to the original document is created. Metadata associated with the modification to the original document is generated. The modification in stored in a data store. Creation and registration of a decentralized identifier (DID) document for the modification is requested based on the generated metadata. Modified document metadata is generated which includes a document hash and the created DID document for the modification. Recordation of the modification in a blockchain transaction, creation and registration of a DID document for the modified document, and generation of verifiable credentials for the modification are requested. The generated verifiable credentials for the modification are stored and a quick response (QR) code for the DID document for the modification is generated. A visual representation of the modification and the QR code for the modification are added to the original document, generating a sealed document.
Automated signature extraction and verification
A system for extraction and verification of handwritten signatures from arbitrary documents. The system comprises one or more computing devices configured to: receive a digital image of a document; perform a dilating transformation via convolution matrix on the digital image to obtain a modified image; determine a plurality of regions of connected markings in the digital image; based at least in part on a pixel density or proximity to an anchor substring of each region, determine whether any region contains any handwritten signature; extract first image data of the region containing a handwritten signature from the digital image; retrieve second image data of a confirmed example signature for a purported signer of the handwritten signature; and based on a comparison of the first image data with the second image data, forward a determination of whether the first image data and second image data are similar.
APPARATUS AND METHOD OF BLINDING HANDWRITTEN SIGNATURE FOR AUTHENTICATION
The present invention relates to a handwritten signature authentication apparatus and method. More particularly, the present invention relates to an apparatus and a method of blinding a handwritten signature for authentication in which when a user writes a handwritten signature, a handwritten signature image displayed on a display device is blinded from a third party nearby.
METHOD AND SYSTEM FOR PROVIDING SIGNATURE RECOGNITION AND ATTRIBUTION SERVICE FOR DIGITAL DOCUMENTS
A method for extracting signatures and assigning signatory name attributions to the extracted signature images from unstructured digital documents is provided. The method includes: receiving a document that includes a signature; detecting a first region within the document in which the signature is present; applying a region-based convolutional neural network to the detected first region in order to demarcate a boundary that surrounds the detected first region; detecting a second region within the document in which a name that relates to the signature is present, by scanning the document to obtain a set of text words and then applying a named entity recognition (NER) machine learning algorithm to determine which text words are names; and assigning a signatory name attribution to the name that is present in the second region, based on a calculated distance between the name and the demarcated boundary.
Coordinate input processing apparatus, emotion estimation apparatus, emotion estimation system, and building apparatus for building emotion estimation-oriented database
A coordinate input processing apparatus includes a position detection apparatus and a communication circuit. The position detection apparatus includes a sensor which detects a position pointed to by an electronic pen, and circuitry which acquires pen state information regarding a state of the electronic pen held by a person. The communication circuit transmits to an emotion estimation apparatus coordinates corresponding to the position pointed to by the electronic pen and the pen state information in an emotional state estimation request, and receives from the emotion estimation apparatus the coordinates corresponding to the position pointed to by the electronic pen, the pen state information included in the emotional state estimation request, and the information regarding the distracted state of the person holding the electronic pen in an emotional state estimation response having the same format as the emotional state estimation request.
Method and apparatus with selective combined authentication
A method and apparatus with selective combined authentication performs a single authentication based on a first modality among plural modalities, and in response to the single authentication having failed, determines whether to perform a combined authentication by a combination of two or more of the plural modalities, and selectively, depending on a result of the determining of whether to perform the combined authentication, performs the combined authentication.
Securing User-Entered Text In-Transit
Systems and methods described herein discuss securing user-entered data in-transit between a first device and a second device. A user may enter text in a document. A first device may analyze the document to identify the user-entered text. The user-entered text may be separated from the document and transformed into an image using a machine learning algorithm. Transforming the text into an image may secure the data in-transit from the first device to a second device. The second device may receive the image and the document from the first device. The second device may reconstruct the user-entered text from the received image and re-assemble the document from the received document and the reconstructed user-entered text.
METHOD FOR AUTHENTICATING A USER USING BIOMETRICS AND DIGITIZED HANDWRITTEN SIGNATURE, AND SYSTEM IMPLEMENTING THE SAME
A method for authenticating a user using biometrics and digitized handwritten signature is provided. A biometric stylus performs fingerprint recognition on the user who uses the biometric stylus to create a handwriting pattern on a handwriting input device, and transmits encrypted identification data to the handwriting input device when the fingerprint recognition is successful. The handwriting input device transmits the encrypted identification data and the handwriting pattern to a verification server. The verification server verifies the handwriting pattern, and decrypts the encrypted identification data for verifying an identity of the user when the handwriting pattern is successfully verified.
Multifactor handwritten signature verification
A system, method, and computer program product for verifying signatures. The system includes at least one processing component, at least one memory component, and a reference storage comprising a set of reference signatures. The system also includes a model generator configured to generate a signature model based on the set of reference signatures. Further, the system includes a verification component configured to receive a signature, and determine whether the signature is valid.
Modular Computing Environment
Systems and methods associated with modular computing environments are provided. For instance, a modular computing environment can include a control entity including one or more processing devices. The modular computing environment can include one or more modular components directly or indirectly coupled to the control entity. The one or more modular components can be configured to receive a module specifying one or more instructions to be performed by an external device. The one or more modular components include one or more processing devices. Each modular component is configured to determine state data associated with the modular component based at least in part on the received module and to provide the state data to the control entity. The state data includes an identification signature of the received module and a configuration context of the modular component within the modular computing environment.