Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Algorithm for the Selection of Reference Signatures for Signature Verification

IP.com Disclosure Number: IPCOM000044444D
Original Publication Date: 1984-Dec-01
Included in the Prior Art Database: 2005-Feb-05
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Chainer, TJ: AUTHOR [+3]

Abstract

Described herein is an algorithm for the selection of reference signatures for signature verification. A critical process in any signature verification system is the selection of the reference signature(s). Previous schemes have involved enrolling the user with six signatures, two of which were picked by a clustering technique. During use, the system kept track of which reference signature was used more frequently. If a user was repeatedly rejected, the operator would tell the system to replace the least used reference with one of the rejected signatures. This process requires the intervention of an operator. It was concluded that this was unacceptable in a commercial environment.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 92% of the total text.

Page 1 of 1

Algorithm for the Selection of Reference Signatures for Signature Verification

Described herein is an algorithm for the selection of reference signatures for signature verification. A critical process in any signature verification system is the selection of the reference signature(s). Previous schemes have involved enrolling the user with six signatures, two of which were picked by a clustering technique. During use, the system kept track of which reference signature was used more frequently. If a user was repeatedly rejected, the operator would tell the system to replace the least used reference with one of the rejected signatures. This process requires the intervention of an operator. It was concluded that this was unacceptable in a commercial environment. The need for adaptation of the reference comes about because users do not always give a representative set of signatures during the 'enroll' session. Also, six signatures are a very small number to use to calculate a threshold. The technique proposed here is to start with the same six 'enroll' signatures but continue control of the application with an alternate personal identification technique for the first few sessions. The alternate could be passwords, for example. In any case, an alternate must exist in any system to handle the situations in which the users are unable to sign, i.e., a broken hand, etc. The first six verification signatures are captured and used with the six original 'enroll' signatures to...