Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

54 results about "Online signature" patented technology

Online signer identity authentication system, device and method based on mobile terminal

An online signer identity authentication system, device and method based on mobile terminal are provided. The method comprises the steps of: calling handwriting data acquisition module to collect real-time handwriting data information of online signer, and obtaining personal identity information of online signer at the same time; obtaining the XY position and the XY direction vector information ofthe handwriting, and sending the processed handwriting data information and the personal identity information of the online signer to the server;according to the personal identity information submitted by the online signer, matching the identity in the user handwriting characteristic database with the personal identity information recorded in advance; according to the identity information matchedin the user handwriting feature database, comparing the real-time handwriting data information of the online signer with the signature handwriting features recorded in the user handwriting feature database in advance; feeding back the online signer signature handwriting feature matching results to complete line signer authentication. The method has the advantages of fast identification speed, high precision, high safety factor, imitation prevention and more reliable safety.
Owner:宁辛

Method and apparatus for aggressive compression, storage and verification of the dynamics of handwritten signature signals

The fields of biometrics and commerce can benefit from the aggressive compression techniques presented here. A novel approach to compressing the on-line handwriting signal without losing the dynamic information (i.e., velocity and order) is presented which provides the means to fit almost any signature sample within the 57-byte limit of one of the free magnetic strips on the back of conventional transaction cards such as credit or debit cards or other identity cards. The apparatus requires an on-line signature capture tablet capable of sampling the handwritten signature in a series of sampled X and Y coordinates. The compression method starts with segmenting the on-line handwriting signal into portions which may be approximated with a set of features from which the velocity and position may be reconstructed. These features are then compressed further using standard compression techniques. A Huffman coding technique is used to demonstrate this step. The size of the average signature including its dynamic information is stored in a space less than 57 bytes which is the magic limit imposed by conventional, magnetic transaction (credit or debit) card strips. This is by far less than about 1000 bytes required if only loss-less techniques were used. A loss-less compression technique is also briefly presented. Normally, out of the three strips which are provided on the back of a card, two strips are available and may be used for storing the template of the owner's signature for future verification.
Owner:BEIGI HOMAYOON S M

Method and Apparatus for Aggressive Compression, Storage and Verification of the Dynamics of Handwritten Signature Signals

The fields of biometrics and commerce can benefit from the aggressive compression techniques presented here. A novel approach to compressing the on-line handwriting signal without losing the dynamic information (i.e., velocity and order) is presented which provides the means to fit almost any signature sample within the 57-byte limit of one of the free magnetic strips on the back of conventional transaction cards such as credit or debit cards or other identity cards. The apparatus requires an on-line signature capture tablet capable of sampling the handwritten signature in a series of sampled X and Y coordinates. The compression method starts with segmenting the on-line handwriting signal into portions which may be approximated with a set of features from which the velocity and position may be reconstructed. These features are then compressed further using standard compression techniques. A Huffman coding technique is used to demonstrate this step. The size of the average signature including its dynamic information is stored in a space less than 57 bytes which is the magic limit imposed by conventional, magnetic transaction (credit or debit) card strips. This is by far less than about 1000 bytes required if only loss-less techniques were used. A loss-less compression technique is also briefly presented. Normally, out of the three strips which are provided on the back of a card, two strips are available and may be used for storing the template of the owner's signature for future verification.
Owner:BEIGI HOMAYOON S M

User-independent online signature recognition method and device based on RNN model

The invention provides a user-independent online signature recognition method and device based on an RNN model. The method comprises the steps that a registration signature and a to-be-authenticated signature are split according to strokes to obtain multiple parts of stroke data, then the stroke data of the registration signature and the stroke data of the to-be-authenticated signature are connected together, and the registration signature is a signature registered by a user in advance; extracting the connected stroke data by using a stroke RNN model to obtain stroke features corresponding tothe stroke data; inputting the stroke features into a signature RNN model to extract overall signature features, and calculating values S1 and S2 corresponding to similarity and difference of the overall signature features; and performing operation according to the values S1 and S2 corresponding to the overall signature feature similarity and the difference degree, finally obtaining the similaritybetween the registered signature and the signature to be authenticated, and outputting an authentication result. According to the method, fewer features and fewer training samples are used, the precision is improved, and the training speed and the running speed are higher.
Owner:CHINA FINANCIAL CERTIFICATION AUTHORITY

Method and system for signature authentication based on elliptical curve

The invention belongs to the technical field of body area network node authentication and provides a method and a system for signature authentication based on an elliptical curve. The method comprises the following steps of initializing authentication parameters based on the elliptical curve; at a node A, randomly selecting (formula) as a private key, computing a public key QA=Dap=(QAx, QAy), storing the private key and publishing the public key (G1, G2, H, P, QA); at the node A, randomly selecting two integers m, wherein r belongs to ZP, and computing a signature value sigma' in an offline state; at the node A, recovering state information m and r and computing an online signature value r' of a message M; generating a complete signature sigmaM of the message M according to the signature value sigma' in the offline state and the online signature value r' of the message M which are obtained by computation, and sending the generated complete signature sigmaM of the message M to a node B; and at the node B, carrying out effective authentication of the signature on the complete signature sigmaM sent by the node A. according to the method and the system, the signature authentication based on the elliptical curve is realized, and the calculated quantity for signature and verification is effectively reduced and the signature verification speed is improved.
Owner:国康中健(北京)科技有限公司

Financial management system and method based on real supply chain

The invention relates to the field of financial data management. The invention provides a financial management system and method based on a real supply chain. The invention discloses a financial management system based on a real supply chain and a financial management method based on the real supply chain. Asset financing can be completed only by using a supply chain financing user of a financialmanagement system intelligent terminal provided with a mobile supply chain, a certificate is generated on line from underlying supply chain assets based on real transaction of buyers and sellers, andthe certificate is confirmed by online signature of the buyers and sellers; the buyer or the seller uploads an invoice, the buyer or the seller corresponding to the invoice, the invoice amount and theinvoice number can be automatically recognized through a self-built OCR invoice recognition system, and a third-party platform is called according to the invoice number to verify the authenticity ofthe invoice; generated supply chain asset buyers and sellers can initiate, any party initiates, the other party confirms and finances that complete trade information is contained, and payment commitments of the buyers are increased. And splitting, transferring and financing the supply chain asset voucher on line.
Owner:深圳宏鹏数字供应链管理有限公司

Online signature identification method based on sample synthesis and sorting learning

PendingCN112699349ASolve difficult to obtain difficultiesSolve problems that are prone to ambiguityDigital data authenticationNeural architecturesOnline signatureFeature vector
The invention discloses an online signature identification method based on sample synthesis and sorting learning. The method comprises the following steps: acquiring a signature sequence and preprocessing the signature sequence; establishing a Sigma Lognormal fitting model of the signature sequence; adding disturbance sampling to the fitting parameters to synthesize a real signature and a forged signature; carrying out sorting learning to optimize average precision loss training neural network model parameters; and for the signature sequence to be identified, extracting features by using the trained neural network model, normalizing the features, and calculating an Euclidean distance between feature vectors to judge authenticity. According to the online signature identification method, the problem that forged samples are difficult to obtain in an online signature identification task is solved, the Sigma Lognormal model is used for generating the samples, collection of forged signature data is not depended on any more, sorting learning is carried out to learn correlation and similarity information between the signature samples, and the high-precision online signature identification method is achieved. The invention has the characteristics of high accuracy, good adaptability and the like, and has good practical value.
Owner:SOUTH CHINA UNIV OF TECH +1

Online and offline circulating unbalanced oil and vinegar signature method

The invention discloses an online and offline circulating unbalanced oil and vinegar signature method. The method decomposes a traditional unbalanced oil and vinegar signature process into an offlinepart and an online part, wherein offline steps are independent of a signature message and can be performed in advance, and a circulating computation method is combined and used during a computing process for enhancing performance. When the online part needs the signature, a computing result stored in the offline steps are combined and used for completing final signature operation. The method provided by the invention is an unbalanced oil and vinegar signature scheme based on a multi-variable public key cryptosystem, a lightweight digital signature scheme applicable to low-performance electronic equipment. The method provided by the invention divides an unbalanced oil and vinegar signature algorithm is divided into the offline part and the online part, the computation of the offline steps can be performed in advance, and the online signature process can be accelerated while the energy can be more fully utilized. According to the method provided by the invention, in the computation of the offline steps, the circulating computation method is used, the size of he secret key is greatly reduced, and meanwhile the signature period is shortened.
Owner:SOUTH CHINA UNIV OF TECH

A signature authentication method and system based on elliptic curve

The invention belongs to the technical field of body area network node authentication and provides a method and a system for signature authentication based on an elliptical curve. The method comprises the following steps of initializing authentication parameters based on the elliptical curve; at a node A, randomly selecting (formula) as a private key, computing a public key QA=Dap=(QAx, QAy), storing the private key and publishing the public key (G1, G2, H, P, QA); at the node A, randomly selecting two integers m, wherein r belongs to ZP, and computing a signature value sigma' in an offline state; at the node A, recovering state information m and r and computing an online signature value r' of a message M; generating a complete signature sigmaM of the message M according to the signature value sigma' in the offline state and the online signature value r' of the message M which are obtained by computation, and sending the generated complete signature sigmaM of the message M to a node B; and at the node B, carrying out effective authentication of the signature on the complete signature sigmaM sent by the node A. according to the method and the system, the signature authentication based on the elliptical curve is realized, and the calculated quantity for signature and verification is effectively reduced and the signature verification speed is improved.
Owner:国康中健(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products