G06V40/33

GENERATION METHOD, NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM FOR STORING GENERATION PROGRAM, AND GENERATION DEVICE
20230048143 · 2023-02-16 · ·

A generation method implemented by a computer, the generation method including: acquiring, by a processor circuit of the computer, read information generated from a reading result that is a document image obtained by imaging a paper document; and generating, by the processor circuit, an electronic document with a signature image that includes the electronic document and the signature image by adding the signature image obtained by imaging a signature written or stamped on the paper document to an electronic document that corresponds to the acquired read information.

Virtual and augmented reality signatures

A method implemented on a visual computing device to authenticate one or more users includes receiving a first three-dimensional pattern from a user. The first three-dimensional pattern is sent to a server computer. At a time of user authentication, a second three-dimensional pattern is received from the user. The second three-dimensional pattern is sent to the server computer. An indication is received from the server computer as to whether the first three-dimensional pattern matches the second three-dimensional pattern within a margin of error. When the first three-dimensional pattern matches the second three-dimensional pattern within the margin of error, the user is authenticated at the server computer. When the first three-dimensional pattern does not match the second three-dimensional pattern within the margin of error, user is prevented from being authenticated at the server computer.

Secure signature creation on a secondary device

Methods and systems for acquiring a freehand or cursive signature on a secondary device with a touch receiving surface for use on a primary device without a touch receiving surface are provided. The primary device sends a message to the secondary device requesting a signature. The user responds by signing her name, using a finger or stylus, on a touch receiving surface. As the user signs her name, the signature is displayed on the secondary device and transmitted to the primary device. The signature may then be stored, displayed, analyzed, or validated by the primary device.

Systems and methods for digital signature detection

A system, method and computer-readable medium are provided to enable digital bank endorsement. A digital image of a back side of a check may be placed in a computer memory. Appropriate coordinates for a bank endorsement may be determined. A bank endorsement may be automatically generated. The digital image may then be electronically altered by overlaying, merging, or rendering text of the generated bank endorsement. A modified digital image may be combined with an image of the front side of the check and stored and/or exported to check clearing operations.

SYSTEMS AND METHODS FOR ELECTRONIC DOCUMENT EXECUTION, AUTHENTICATION, AND FORENSIC REVIEW
20230214502 · 2023-07-06 · ·

Embodiments disclosed herein include systems and methods for generating and editing digital documents, and applying electronic signatures to the documents. The system further performs forensic operations on digital documents for determining the authenticity of the document data or metadata and validating the status of document. The forensic operations may include, for example, security operations, audit trail analysis, and authenticity/verification analysis, which the system performs on an input document being scrutinized for authenticity and a master digital document purportedly corresponding to the input digital document. The system may apply a machine-learning architecture to identify discrepancies otherwise imperceptible to humans or to speed the review process. The system may generate a report for the user who submitted the forensics request indicating the results of the forensic operations. The available forensics operations and level of information about the master digital document are tailored to permissions afforded to the submitting-user.

VALIDATING IDENTIFICATION DOCUMENTS

The method, system, and non-transitory computer-readable medium embodiments described herein are directed to verifying identification documents. In various embodiments, a server may receive a first image of a front-side of an identification document. The server may extract a first feature of the front-side of the identification document from the first image using optical character recognition (OCR) and identify a first environmental feature from the first image. The server may receive a second image of a backside of the identification document and identify a second feature of the backside of the identification document from the second image. The server may also identify a second environmental feature from the second image. The server may verify the identification document by confirming that the first feature matches the second feature and the first environmental feature matches the second environmental feature.

Systems and methods for providing electronic infrastructure on paper documents

Systems, apparatuses, methods, and computer program products are disclosed for authenticating handwriting on paper-based documents. An example method includes receiving, by an embedded chip device, handwriting information from a signature device in communication with the embedded chip device. The example method further includes transmitting, by the embedded chip device, document identification information to the signature device. The example method further includes receiving, by the embedded chip device, authentication information from the signature device. Subsequently, the example method includes storing, by the embedded chip device, the handwriting information and the authentication information as handwriting authentication metadata in association with the document identification information.

Display panel defect enhancement

The present invention relates to a method, system and computer program product for defect enhancement. According to the method, a plurality of proposed regions from a plurality of images taken for a display panel is obtained. Each of proposed region of the plurality of proposed regions include a suspected defect on the display panel. At least two proposed regions from the plurality of proposed regions that deserve to be superimposed based on a set of conditions is determined. The at least two proposed regions for acquiring an enhanced defect are superimposed.

Method and system for determining one or more target objects in an image

The present disclosure discloses a method and an object determination system for determining one or more target objects in an image. The image is segmented by the object detection system into one or more segments based on visual attributes in a first set. Morphological operations are performed on the one or more segments to obtain one or more morphed segments. One or more candidates of target objects are identified based on visual attributes in a second set corresponding to each one or more morphed segments. The object determination system identifies at least one of true positive and false positive from the one or more candidates which indicates presence or absence of the one or more target objects respectively, based on neighborhood information associated with the one or more candidates. The present disclosure facilitates in determining target objects in document automatically, thereby eliminating manual intervention in identifying target objects in the document.

SYSTEM AND METHOD FOR DETECTING SIGNATURE FORGERIES
20220351199 · 2022-11-03 ·

Two models are first trained and then test images are applied to the two trained models in an effort to detect signature forgeries. The first model is trained with pairs of signature images and the resultant trained model is capable of detecting blind forgeries. The second model is trained with triplets of signature images and is capable of detecting skilled signature forgeries. After the two models are trained, test images are applied to the models and determinations are made as to whether a blind or skilled forgery is present.