Conventional techniques for
logging and using a user's signature are insecure and inflexible. A
system and method are provided which: i) translate a user's first signature, such as a user'
s voice signature, into a user's second signature, such as a
radio frequency identifier signature; and ii) deploy the user's second signature. By translating the user's first signature into the user's second signature and deploying the user's second signature, the provided technique assures the authenticity of the user. Furthermore, the provided
system and method enable additional
authentication factors, such as a user's
personal identification number, to be used with the user's first and second signatures in multiple combinations and sequences to assure the authenticity of the user. As such, the invention provides a
security layer offering added security and added flexibility previously unavailable, and which may be applied in a variety of contexts, such as a
user device or a retail transaction.