×

Method for verifying a handwritten signature entered into a digitizer

  • US 5,434,928 A
  • Filed: 12/06/1993
  • Issued: 07/18/1995
  • Est. Priority Date: 12/06/1993
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of verifying a handwritten signature entered into a digitizer comprising the steps of:

  • (a) providing a handwriting capture device including the digitizer and a hand-held stylus for capturing the handwritten signature;

    (b) sensing the location of a series of signature points progressively traversed by the stylus during strokewise movement thereof by the digitizer for a plurality of signatures of a person;

    (c) generating a stream of digital position data from the analog position data from the digitizer for the plurality of signatures indicating the location of the signature points on the surface of the digitizer, pen down time, and total time to sign;

    (d) storing the position data in an ordered arrangement corresponding to the strokewise sequence of the data within the stream for the plurality of signatures;

    (e) retrieving the position data from storage in a sequence related to the storage order thereof for the plurality of signatures;

    (f) generating verification information including a count of the signatures, a sum of global variable values for the signatures, a sum of the squares of the global variable values for the signatures, and head and tail strings representing the average shape of the signatures by a processor coupled to the digitizer;

    (g) storing the verification information in a storage medium carried by the person;

    (h) determining a set of positional data points for a subsequent handwritten signature entered into the digitizer by a person;

    (i) determining a set of global variable values associated with the subsequent signature from the positional data points by the processor;

    (j) determining head and tail strings for the subsequent signature by the processor;

    (k) reading the head and tail strings from the storage medium carried by the person by the processor;

    (l) reading the verification information from the storage medium by the processor;

    (m) determining a range of acceptance values for each global variable by the processor;

    (n) determining whether each of the global verification values lies within the range of acceptance;

    (o) if at least one of the global verification values lies outside the range of acceptance, rejecting the subsequent signature as a forgery;

    (p) if each of the global verification values lies within the range of acceptance, determining whether the head and tail strings of the subsequent signature equal the head and tail strings from the storage medium;

    (q) if both of the head and tail strings of the subsequent signature are not equal to the head and tail strings from the storage medium, rejecting the subsequent signature as a forgery;

    (r) if either the head or the tail string of the subsequent signature are equal to the head or tail strings from the storage medium, accepting the signature as valid;

    (s) compressing and packing the subsequent signature by the processor, including the substeps of(s-1) retrieving the position data from storage in a sequence related to the storage order thereof;

    (s-2) computing the locations of the signature points relative to a series of strokewise oriented guide lines by the processor, wherein each guide line has two end points, including a start point and a stop point;

    (s-3) selecting only the position data corresponding to those of the signature points which do not fall within a rectangle about a corresponding guide line, the rectangle including a first line through the start point and perpendicular to the guide line, a second line through the stop point and perpendicular to the guide line, a third line on one side of the guide line and parallel to it, and a fourth line on the other side of the guide line and parallel to it;

    (s-4) determining delta values for each guide line, each delta value being represented by a predetermined number of bits less than the number of bits representing the end points;

    (s-5) discarding a predetermined number of lower bits from each delta value; and

    (s-6) readjusting each delta value to limit error propagation; and

    (t) storing the compressed-packed subsequent signature in another storage medium coupled to the processor.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×