Patent classifications
G06V40/30
Methods and systems for signature verification
A method and system of signature verification that includes receiving a signature-in-question, extracting at least one of an image of the signature-in-question and a trajectory of the signature-in-question from the received signature-in-question, accessing a reference signature, extracting at least one of a reference image and a reference trajectory from the accessed reference signature, comparing the at least one of the image of the signature-in-question and trajectory of the signature-in-question to the at least one of the reference image and reference trajectory, and determining whether signature-in-question is authentic based on the comparison.
ENTITY IDENTIFICATION AND AUTHENTICATION USING A COMBINATION OF INDEPENDENT IDENTIFICATION TECHNOLOGIES OR PLATFORMS AND APPLICATIONS THEREOF
Techniques are described for identifying and/or authenticating entities using a combination of independent identification technologies and/or platforms. In one embodiment, a system can comprising a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory.
The computer executable components can comprise a reception component that receives, from an entity, a request to authorize the entity based on image data of a person, wherein the request comprises the image data, and an authentication component that determines whether the person included in the image data corresponds to the entity.
AUGMENTED SIGNATURE AUTHENTICATION METHOD AND ELECTRONIC DEVICE
Provided are an augmented handwritten signature authentication method and an electronic device supporting the same, the method including: receiving a primary touch input corresponding to a primary handwritten signature input of a user; receiving, after the primary handwritten signature input is received and a specified time period elapses, a secondary mark input of the user; obtaining primary touch position data corresponding to the primary touch input, and the secondary mark input; and performing user authentication by comparing the primary touch position data corresponding to the primary touch input and secondary touch position data related to at least part of the secondary mark input with prestored primary touch registration data and secondary touch registration data, respectively.
Display panel defect enhancement
The present invention relates to a method, system and computer program product for defect enhancement. According to the method, a plurality of proposed regions from a plurality of images taken for a display panel is obtained. Each of proposed region of the plurality of proposed regions include a suspected defect on the display panel. At least two proposed regions from the plurality of proposed regions that deserve to be superimposed based on a set of conditions is determined. The at least two proposed regions for acquiring an enhanced defect are superimposed.
Digital identity authentication and verification system, method, and device
This disclosure generally relates to a method for authenticating a user in a digital or physical environment. The method includes receiving an identity verification request based on input provided by a user to be verified, receiving a facial and audio recognition sample from the user, transmitting the facial and audio recognition sample to one or more third party entities with a request to verify that the facial and audio recognition sample represents the user, receiving an indication from at least one of the third party entities that the user is verified, and verifying that the user who provided the facial and audio recognition sample is the person the user purports to be.
Digital identity authentication and verification system, method, and device
This disclosure generally relates to a method for authenticating a user in a digital or physical environment. The method includes receiving an identity verification request based on input provided by a user to be verified, receiving a facial and audio recognition sample from the user, transmitting the facial and audio recognition sample to one or more third party entities with a request to verify that the facial and audio recognition sample represents the user, receiving an indication from at least one of the third party entities that the user is verified, and verifying that the user who provided the facial and audio recognition sample is the person the user purports to be.
SYSTEM AND METHOD FOR DETECTING SIGNATURE FORGERIES
Two models are first trained and then test images are applied to the two trained models in an effort to detect signature forgeries. The first model is trained with pairs of signature images and the resultant trained model is capable of detecting blind forgeries. The second model is trained with triplets of signature images and is capable of detecting skilled signature forgeries. After the two models are trained, test images are applied to the models and determinations are made as to whether a blind or skilled forgery is present.
System and method for securing electronic document execution and authentication
The present embodiments provide an environment where a user first creates or imports a document comprising of fields to be completed by one or more users. All users who have view-only access or can act on a document are considered to be “in the workflow.” All users in the workflow (except view-only users) can take actions in the document by editing, adding or entering values or signatures in those fields. When the document is complete, a computing device adds an encrypted token visualization element to the document that uniquely identifies and secures the document. Thereafter, a copy of the original document, all attachments, authentication, security and validation information, and all other relevant information about the document and users will be available to view in the chain of custody and audit trail by the authorized users by scanning the token visualization element within the platform (web application or mobile application).
Method and device for deriving pen position and reporting pen position to host computer
A method performed by a device (e.g., touch controller) includes deriving a pen position, and transmitting a report indicating the derived pen position to a host computer. The report includes a first area storing position data indicating the derived position and a second area storing non-position data different from the position data. The method includes securing a buffer area for retaining a plurality of the reports in a memory, deriving the pen position at each determined scanning time, and generating a report including the position data indicating the derived position. The method includes storing the report in the buffer area and, in response to obtaining the non-position data, writing the non-position data in the second area of each of one or more of the reports stored in the buffer area. The method includes transmitting the plurality of the reports stored in the buffer area to the host computer.
SECURE SIGNING METHOD, DEVICE AND SYSTEM
A record including an original document and a modification to the original document is created. Metadata associated with the modification to the original document is generated. The modification in stored in a data store. Creation and registration of a decentralized identifier (DID) document for the modification is requested based on the generated metadata. Modified document metadata is generated which includes a document hash and the created DID document for the modification. Recordation of the modification in a blockchain transaction, creation and registration of a DID document for the modified document, and generation of verifiable credentials for the modification are requested. The generated verifiable credentials for the modification are stored and a quick response (QR) code for the DID document for the modification is generated. A visual representation of the modification and the QR code for the modification are added to the original document, generating a sealed document.