Method and system for authenticating a digitized signature for execution of an electronic document
First Claim
1. A method of authenticating a digitized signature for execution of an electronic document, comprising the steps of:
- (a) establishing a digital representation of a user'"'"'s valid signature;
(b) storing said digital representation of said valid signature;
(c) establishing a secret sign, said secret sign being known only to the user;
(d) creating a template of value ranges for predetermined features of said secret sign;
(e) electronically storing said template;
(f) providing an electronic document for execution by the user;
(g) hand writing said secret sign on a signature entry device;
(h) measuring values of said predetermined features for said handwritten secret sign;
(i) comparing said measured values with said value ranges of said template to authenticate said secret sign; and
, (j) appending a copy of said digital representation of said user'"'"'s valid signature to said electronic document responsive to authentication of said secret sign.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system of authenticating a digitized signature for execution of an electronic document is provided. The method includes the steps of: entering an electronic signature (12), storing the electronic signature (14), determining a secret sign (16), storing a template of value ranges associated with predetermined features of the secret sign (18), handwriting of a secret sign (24), measuring the predetermined feature values of the handwritten secret sign (26), comparing those measured values to the stored value ranges (28), and attaching a digital representation of the user'"'"'s valid signature to an electronic document responsive to authentication of the handwritten secret sign (30).
109 Citations
27 Claims
-
1. A method of authenticating a digitized signature for execution of an electronic document, comprising the steps of:
-
(a) establishing a digital representation of a user'"'"'s valid signature;
(b) storing said digital representation of said valid signature;
(c) establishing a secret sign, said secret sign being known only to the user;
(d) creating a template of value ranges for predetermined features of said secret sign;
(e) electronically storing said template;
(f) providing an electronic document for execution by the user;
(g) hand writing said secret sign on a signature entry device;
(h) measuring values of said predetermined features for said handwritten secret sign;
(i) comparing said measured values with said value ranges of said template to authenticate said secret sign; and
,(j) appending a copy of said digital representation of said user'"'"'s valid signature to said electronic document responsive to authentication of said secret sign. - View Dependent Claims (2, 3, 5, 6, 7, 8, 9, 10, 11)
-
-
4. The method of authenticating a digitized signature for execution of an electronic document as recited in claim I wherein said step of creating a template includes the step of encrypting said value ranges.
-
12. A system for authenticating a digitized signature for execution of an electronic document, comprising:
-
a signature storage medium having a digital representation of a user'"'"'s valid signature stored therein;
a handwriting entry device for receiving and digitizing a secret sign known only to a user;
a template storage medium for storing a set of value ranges for predetermined features of an authentic secret sign;
a processor in electrical communication with said handwriting entry device, said template storage medium and said signature storage medium, said processor comparing values for said predetermined features of said digitized secret sign and said set of value ranges for said predetermined features of said authentic secret sign to authenticate said digitized secret sign, said processor appending said digital representation of the user'"'"'s valid signature to an electronic document responsive to said authentication of said digitized secret sign. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method of verifying access rights to an electronic system, comprising the steps of:
-
(a) establishing a secret sign for a user, said secret sign being known only to the user;
(b) creating a template of value ranges for predetermined features of said secret sign;
(c) electronically storing said template;
(d) hand writing said secret sign on a signature entry device;
(e) measuring values of said predetermined features for said handwritten secret sign;
(f) comparing said measured values with said value ranges of said template to authenticate said secret sign; and
(g) granting the user access to the electronic system responsive to authentication of said secret sign. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification