US20070177773A1 - Method and apparatus for rolling enrollment for signature verification - Google Patents

Method and apparatus for rolling enrollment for signature verification Download PDF

Info

Publication number
US20070177773A1
US20070177773A1 US11/343,689 US34368906A US2007177773A1 US 20070177773 A1 US20070177773 A1 US 20070177773A1 US 34368906 A US34368906 A US 34368906A US 2007177773 A1 US2007177773 A1 US 2007177773A1
Authority
US
United States
Prior art keywords
signature
user
samples
threshold value
reference set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/343,689
Inventor
Jianying Hu
Gregory Russell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/343,689 priority Critical patent/US20070177773A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HU, JIANYING, RUSSELL, GREGORY FRASER
Priority to EP06839484A priority patent/EP1989813A2/en
Priority to PCT/US2006/060101 priority patent/WO2007089356A2/en
Priority to JP2008552302A priority patent/JP5285432B2/en
Priority to CN2006800495879A priority patent/CN101366228B/en
Priority to TW096103052A priority patent/TW200809656A/en
Publication of US20070177773A1 publication Critical patent/US20070177773A1/en
Priority to US12/125,396 priority patent/US7676069B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/30Writer recognition; Reading and verifying signatures
    • G06V40/37Writer recognition; Reading and verifying signatures based only on signature signals such as velocity or pressure, e.g. dynamic signature recognition
    • G06V40/394Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/28Determining representative reference patterns, e.g. by averaging or distorting; Generating dictionaries

Definitions

  • This present invention generally relates to signature verification systems and, more particularly, to improved techniques for adapting such systems to natural signature variations.
  • Signature verification is a commonly used biometric authentication method. Compared with other forms of biometric authentication such as fingerprint or iris verification, signature verification has the advantage that it is a historically well-established and well-accepted approbation method and is thus perceived to be less intrusive than modern alternatives. This property makes it particularly attractive to applications in banking, retail and hospitality industries.
  • Signature verification is divided into two main areas: static (offline) signature verification where signature samples are optically scanned into image representations, and dynamic (online) signature verification where signature samples are collected from a digitizing tablet capable of recording pen movements during writing.
  • the process of signature verification involves comparing a new signature submitted for testing to a set of previously collected reference signatures to determine whether the new signature is authentic. Having a set of references that captures the natural variation among different authentic signatures of the same subject is crucial for a verification system to operate effectively.
  • the number of signature samples collected during initial enrollment should be limited to no more than three.
  • samples collected in one session are typically not very representative of the natural variation exhibited by most signers. Often, a larger degree of variation is observed on samples collected from different sessions with long breaks (i.e., days) in between. Furthermore, it is known that samples collected in one session can not capture the “drift” (i.e., a slow shifting of style over a period of time) which is also common among signers.
  • drift i.e., a slow shifting of style over a period of time
  • Principles of the present invention are directed toward improved techniques for adapting signature verification systems to natural signature variations.
  • a technique for adapting a signature verification system to variations in a signature of a user comprises the following steps/operations.
  • One or more signature samples are obtained from the user.
  • the one or more obtained signature samples are submitted by the user as part of a regular authentication procedure associated with the signature verification system.
  • a reference set of signature samples for the user is updated through selection of one or more signature samples from the obtained signature samples, such that the updated reference set is usable by the signature verification system for verifying subsequent signature samples attributed to the user.
  • the selection of the one or more signature samples used to update the reference set is conditioned on a false rejection rate of the user when at least one obtained signature sample of the user is authenticated and on an identification check when no obtained signature sample is authenticated.
  • FIG. 1 is a block diagram illustrating a signature verification system, according to an embodiment of the invention.
  • FIG. 2 is a flow diagram illustrating a signature verification methodology, according to an embodiment of the invention.
  • the present invention provides a process to improve the performance of a signature verification system and enable the system to adapt to natural signature variations by dynamically supplementing and updating subject reference samples in a non-intrusive manner through the selection of representative samples collected during regular authentication sessions. That is, the invention provides a technique for updating the reference set in a non-intrusive manner, without extra effort on the part of the users, while at the same time selecting only the samples that are most likely to be representative.
  • Such an inventive technique enables a signature verification system to dynamically supplement and update the initial reference set in a non-intrusive manner using samples that are collected during normal signature verification sessions. That is, in accordance with the invention, enrollment is passive in that it is performed, in the background, while the user is normally signing in to perform some transaction (e.g., retail or banking transaction), rather than via a separate, active enrollment process.
  • enrollment is passive in that it is performed, in the background, while the user is normally signing in to perform some transaction (e.g., retail or banking transaction), rather than via a separate, active enrollment process.
  • the techniques of the invention can also be utilized after an initial active enrollment process, wherein an initial reference set of signature samples is collected. The inventive process selects and updates the reference set, possibly each time the user regularly employs the system.
  • verification policies of the invention add signature samples that do not produce a very high score during verification, thus more effectively capturing the signer variation.
  • the administration of these policies is fine tuned for each individual account based on its current false rejection (FR) rate to reduce the probability of reference set contamination through the addition of forgeries.
  • FR current false rejection
  • False rejection is typically the situation wherein the signature verification system fails to verify the true owner of a signature based on that signature
  • FA false acceptance
  • signature verification system 100 includes a digitizing tablet 102 with stylus (pen) 104 , input/output devices 106 , processor 108 , memory 110 , and network interface 112 , each coupled to a communication bus 114 .
  • a user signs his or her name on digitizing tablet 102 using stylus 104 .
  • the digitizing tablet is capable of recording stylus movements during writing.
  • the signature typically along with an identifier (ID) of the user (e.g., personal identification number (PIN), phone number, or date of birth), are used to verify the user's identity, such that some transaction can be performed or completed.
  • ID typically along with an identifier (ID) of the user (e.g., personal identification number (PIN), phone number, or date of birth), are used to verify the user's identity, such that some transaction can be performed or completed.
  • ID personal identification number
  • the particular transaction depends on the particular application (e.g., a retail transaction, a banking transaction, etc.).
  • Input/output devices 106 , processor 108 , and memory 110 are used to perform the signature verification, and possibly a part of or the entire application-specific transaction.
  • input/output devices 106 may include a visual display (an example of an output device) that prompts the user to enter his or her signature (e.g., for the transaction or for enrollment), and that gives the user other information or feedback regarding verification or the transaction.
  • Input/output devices 106 may also include a keypad or keyboard that permits the user to enter information such as a user ID.
  • the digitizing tablet may have the ability to provide visual feedback and ID entry to the user, rather than use of separate devices.
  • processor 108 and memory 110 perform the computations necessary to accomplish signature verification, and even the transaction.
  • processor as used herein is intended to include any processing device, such as, for example, one that includes a central processing unit (CPU) and/or other processing circuitry (e.g., digital signal processor (DSP), microprocessor, etc.). Additionally, it is to be understood that the term “processor” may refer to more than one processing device, and that various elements associated with a processing device may be shared by other processing devices.
  • CPU central processing unit
  • DSP digital signal processor
  • processor may refer to more than one processing device, and that various elements associated with a processing device may be shared by other processing devices.
  • memory as used herein is intended to include memory and other computer-readable media associated with a processor or CPU, such as, for example, random access memory (RAM), read only memory (ROM), fixed storage media (e.g., hard drive), removable storage media (e.g., diskette), flash memory, etc.
  • RAM random access memory
  • ROM read only memory
  • fixed storage media e.g., hard drive
  • removable storage media e.g., diskette
  • flash memory etc.
  • Network interface 112 may include, for example, one or more devices capable of allowing the signature verification system 110 to communicate with other computing systems.
  • the network interface may comprise a transceiver configured to communicate with a transceiver of another computer system via a suitable communications protocol.
  • the invention is not limited to any particular communications protocol. That is, it is possible that system 100 operates with one or more other computing systems to perform signature verification and a transaction. For example, signature verification alone could be performed by system 100 , results of which are provided to an application server coupled to system 100 via network interface 112 , which performs the transaction.
  • communication bus 114 does not have to be a local bus, but rather can itself represent a network connection wherein one or more components of signature verification system 100 are located remote from one or more other components.
  • FIG. 1 represents a computing system wherein one or more computer programs, or software components thereof, including instructions or code for performing methodologies described herein, may be stored in one or more of the associated storage media (e.g., ROM, fixed or removable storage) and, when ready to be utilized, loaded in whole or in part (e.g., into RAM) and executed by the processor 108 .
  • the associated storage media e.g., ROM, fixed or removable storage
  • methodologies described herein may be implemented in various forms of hardware, software, or combinations thereof, e.g., one or more operatively programmed general purpose digital computers with associated memory, implementation-specific integrated circuit(s), functional circuitry, etc.
  • system 100 performs rolling enrollment, as described below in the context of FIG. 2 .
  • Rolling enrollment enables signature verification system 100 to dynamically supplement and update an initial reference set used to verify a user in a non-intrusive manner using samples that are collected during normal signature verification sessions, i.e., during the regular sign-on process.
  • the regular authentication process proceeds as follows. Each submitted sample is compared to reference signatures (or a model or template derived from these reference signatures) for this user stored in the system (called an account) and a score is produced indicating how well the new sample matches the reference samples stored in the system. If the score is higher than a pre-selected threshold, Tr, then authentication succeeds. Otherwise, the user is invited to submit another sample, which is checked against the reference samples again. This process continues until the maximum number of trials has been exceeded. At this point, the user is subjected to an ID check and accepted if he/she passes the ID check, rejected otherwise.
  • verification process 200 of FIG. 2 the procedure of collecting additional reference samples runs in the background in parallel to this regular sign-on procedure. It is to be understood that the term “subject” used in the context of FIG. 2 means “user.”
  • variable N represents the number of signature sample submissions of the user (or trials). Initially, N is set to zero (step 204 ). MaxN represents the maximum number of trials permitted. The variable is checked after a sample submission (step 204 ) to determine if the maximum number of trials is reached.
  • the subject submits a signature sample in step 206 .
  • the sample is compared to the existing reference samples and a sample score is computed.
  • the method for generating the sample score may be any known signature comparison and score generation process, e.g., based on distance metrics, etc.
  • comparison and scoring methods disclosed in G. Russell et al. “Dynamic Signature Verification Using Discriminative Training,” Proceedings of the 8th International Conference on Document Analysis and Recognition (ICDAR2005), Seoul, Korea, August 2005, or in A. Kholmatov et al., “Biometric Authentication Using Online Signatures,” Lecture Notes in Computer Science ISCIS, October 2004, may be employed.
  • the invention is not limited to any particular score generation process.
  • Tr Whenever a submitted signature sample produces a score equal to or lower than the acceptance threshold Tr (a “no” in step 208 ), the score is compared to a lower threshold Tb, in step 210 , and added to the candidate reference pool in step 212 if it is higher than Tb (a “yes” in step 210 ).
  • Tr and Th form a threshold value range.
  • Tr may be 0.8 and Tb may be 0.3.
  • variable N is incremented in step 212 .
  • a purpose of the threshold Tb is to root out outlier samples caused, for example, by hardware malfunction or a poor signature rendering. If the sample score is equal to or less than Tb, the sample is discarded in step 214 . In this manner, the candidate reference pool accumulates in the background until the signer is either rejected or accepted.
  • step 216 If the signer is rejected via an ID comparison (wherein an ID entered by the user is compared to a previously stored ID known to be associated with the user) in step 216 , then the subject is rejected and no reference set updating is performed (step 218 ).
  • the current false rejection (FR) rate for the subject is checked to determine whether the reference set should be updated.
  • the FR rate for each subject can be determined by keeping counts of the number of rejected samples given by the subject and divide that by the total number of signatures provided by the subject, within a given period (e.g., the past year). This rate can be updated periodically, or after each successful authentication session, and saved as an attribute associated with the subject. In such case, only samples provided during successful authentication sessions (i.e., samples that are therefore considered to be genuine) are counted.
  • the following rule is applied in order to reduce the possibility of adding false samples into the reference set while at the same time allowing necessary updates. If the FR rate is very low (lower than a pre-determined threshold Tfr, as compared in step 222 after a “yes” in step 208 ), then the subject is accepted and no reference update is performed (step 224 ). This is because there is no need to aggressively add new reference samples in this case. On the other hand, if the FR rate is higher than Tfr (a “yes” in step 222 ), then sample update is performed by adding all samples in the candidate reference pool to the reference set (step 220 ). This is because: (1) the high FR rate indicates that the account is in greater need of sample update; and (2) the FA rate is likely low and thus the risk of adding false samples is low. We call this form of updating a “type II” update.
  • Tfr threshold Tfr
  • tolerance for FR is relatively low (for fear of offending customers) but tolerance for FA is relatively high (since the transaction amount is likely small)
  • Tfr should be a low value such as 0.05.
  • Tfr should be a higher value such as 0.2.
  • This strategy is also able to capture the “drift” of a signer with a small delay (the length of the evaluation cycle). That is, when the drift is significant enough to cause substantially higher FR, type II updates will be performed which, along with type I updates, will quickly add more reference samples until FR falls below the threshold again.
  • a score is typically a single number used to compare against a threshold to determine whether to accept a signature, as described above, a score space is all possible values a score can take on.
  • a feature is a multidimensional representation of the characteristics of a signature and, thus, a feature space is all possible values a feature can take on.

Abstract

Improved techniques are disclosed for adapting signature verification systems to natural signature variations. For example, a technique for adapting a signature verification system to variations in a signature of a user includes the following steps/operations. One or more signature samples are obtained from the user. The one or more obtained signature samples are submitted by the user as part of a regular authentication procedure associated with the signature verification system. A reference set of signature samples for the user is updated through selection of one or more signature samples from the obtained signature samples, such that the updated reference set is usable by the signature verification system for verifying subsequent signature samples attributed to the user. The selection of the one or more signature samples used to update the reference set is conditioned on a false rejection rate of the user when at least one obtained signature sample of the user is authenticated and on an identification check when no obtained signature sample is authenticated.

Description

    FIELD OF THE INVENTION
  • This present invention generally relates to signature verification systems and, more particularly, to improved techniques for adapting such systems to natural signature variations.
  • BACKGROUND OF THE INVENTION
  • Signature verification is a commonly used biometric authentication method. Compared with other forms of biometric authentication such as fingerprint or iris verification, signature verification has the advantage that it is a historically well-established and well-accepted approbation method and is thus perceived to be less intrusive than modern alternatives. This property makes it particularly attractive to applications in banking, retail and hospitality industries.
  • Signature verification is divided into two main areas: static (offline) signature verification where signature samples are optically scanned into image representations, and dynamic (online) signature verification where signature samples are collected from a digitizing tablet capable of recording pen movements during writing.
  • In general, the process of signature verification involves comparing a new signature submitted for testing to a set of previously collected reference signatures to determine whether the new signature is authentic. Having a set of references that captures the natural variation among different authentic signatures of the same subject is crucial for a verification system to operate effectively.
  • In existing systems, a number of signature samples (typically five to ten) are collected in one enrollment session and used as reference samples. However, there are a number of drawbacks with this scheme.
  • First, in some applications such as retail, collecting many samples during one enrollment session puts an undue burden on customers. Ideally, the number of signature samples collected during initial enrollment should be limited to no more than three.
  • Second, even if more samples can be collected during enrollment, samples collected in one session are typically not very representative of the natural variation exhibited by most signers. Often, a larger degree of variation is observed on samples collected from different sessions with long breaks (i.e., days) in between. Furthermore, it is known that samples collected in one session can not capture the “drift” (i.e., a slow shifting of style over a period of time) which is also common among signers.
  • One known solution to these problems is to first collect the reference samples over several enrollment sessions to capture the current range of variation, then have periodic “re-enrollment” sessions (e.g., once a year) to capture the signature drift. However, this is not very practical because of the extra burden placed on the customers.
  • Another known solution is to add to the reference set, at a time during or after the regular authentication (e.g., sign-in verification) process, any signature sample that produced a high enough score during verification. However, this policy is not very effective since setting the threshold too high will only allow the addition of samples that are very close to the initial reference samples, thus defeating the purpose of capturing more variation; while setting it too low will increase the risk of adding forgeries, thus polluting the reference set.
  • SUMMARY OF THE INVENTION
  • Principles of the present invention are directed toward improved techniques for adapting signature verification systems to natural signature variations.
  • In one aspect of the invention, a technique for adapting a signature verification system to variations in a signature of a user comprises the following steps/operations. One or more signature samples are obtained from the user. The one or more obtained signature samples are submitted by the user as part of a regular authentication procedure associated with the signature verification system. A reference set of signature samples for the user is updated through selection of one or more signature samples from the obtained signature samples, such that the updated reference set is usable by the signature verification system for verifying subsequent signature samples attributed to the user. The selection of the one or more signature samples used to update the reference set is conditioned on a false rejection rate of the user when at least one obtained signature sample of the user is authenticated and on an identification check when no obtained signature sample is authenticated.
  • These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram illustrating a signature verification system, according to an embodiment of the invention; and
  • FIG. 2 is a flow diagram illustrating a signature verification methodology, according to an embodiment of the invention.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • The following description will illustrate the invention using an exemplary data processing system architecture. It should be understood, however, that the invention is not limited to use with any particular processing system architecture. The invention is instead more generally applicable to any processing system in which it would be desirable to improve the ability of a signature verification system to adapt to natural signature variations.
  • As will be illustratively explained herein, the present invention provides a process to improve the performance of a signature verification system and enable the system to adapt to natural signature variations by dynamically supplementing and updating subject reference samples in a non-intrusive manner through the selection of representative samples collected during regular authentication sessions. That is, the invention provides a technique for updating the reference set in a non-intrusive manner, without extra effort on the part of the users, while at the same time selecting only the samples that are most likely to be representative.
  • Such an inventive technique, referred to herein as “rolling enrollment,” enables a signature verification system to dynamically supplement and update the initial reference set in a non-intrusive manner using samples that are collected during normal signature verification sessions. That is, in accordance with the invention, enrollment is passive in that it is performed, in the background, while the user is normally signing in to perform some transaction (e.g., retail or banking transaction), rather than via a separate, active enrollment process. However, it is to be understood that the techniques of the invention can also be utilized after an initial active enrollment process, wherein an initial reference set of signature samples is collected. The inventive process selects and updates the reference set, possibly each time the user regularly employs the system.
  • Unlike existing schemes, verification policies of the invention add signature samples that do not produce a very high score during verification, thus more effectively capturing the signer variation. At the same time, the administration of these policies is fine tuned for each individual account based on its current false rejection (FR) rate to reduce the probability of reference set contamination through the addition of forgeries. False rejection is typically the situation wherein the signature verification system fails to verify the true owner of a signature based on that signature, while false acceptance (FA) is typically the situation wherein the system verifies an imposter based on a false or forged signature.
  • Before illustratively describing specific steps of the inventive technique, an overview of a signature verification system is given in the context of FIG. 1.
  • As shown in FIG. 1, signature verification system 100 includes a digitizing tablet 102 with stylus (pen) 104, input/output devices 106, processor 108, memory 110, and network interface 112, each coupled to a communication bus 114.
  • In general, a user (e.g., a customer in a retail application) signs his or her name on digitizing tablet 102 using stylus 104. As is well known, the digitizing tablet is capable of recording stylus movements during writing. The signature, typically along with an identifier (ID) of the user (e.g., personal identification number (PIN), phone number, or date of birth), are used to verify the user's identity, such that some transaction can be performed or completed. The particular transaction depends on the particular application (e.g., a retail transaction, a banking transaction, etc.).
  • Input/output devices 106, processor 108, and memory 110 are used to perform the signature verification, and possibly a part of or the entire application-specific transaction. For example, input/output devices 106 may include a visual display (an example of an output device) that prompts the user to enter his or her signature (e.g., for the transaction or for enrollment), and that gives the user other information or feedback regarding verification or the transaction. Input/output devices 106 may also include a keypad or keyboard that permits the user to enter information such as a user ID. Of course, as is known, the digitizing tablet may have the ability to provide visual feedback and ID entry to the user, rather than use of separate devices.
  • As is known, processor 108 and memory 110 perform the computations necessary to accomplish signature verification, and even the transaction. It is to be appreciated that the term “processor” as used herein is intended to include any processing device, such as, for example, one that includes a central processing unit (CPU) and/or other processing circuitry (e.g., digital signal processor (DSP), microprocessor, etc.). Additionally, it is to be understood that the term “processor” may refer to more than one processing device, and that various elements associated with a processing device may be shared by other processing devices. The term “memory” as used herein is intended to include memory and other computer-readable media associated with a processor or CPU, such as, for example, random access memory (RAM), read only memory (ROM), fixed storage media (e.g., hard drive), removable storage media (e.g., diskette), flash memory, etc.
  • Network interface 112 may include, for example, one or more devices capable of allowing the signature verification system 110 to communicate with other computing systems. Thus, the network interface may comprise a transceiver configured to communicate with a transceiver of another computer system via a suitable communications protocol. It is to be understood that the invention is not limited to any particular communications protocol. That is, it is possible that system 100 operates with one or more other computing systems to perform signature verification and a transaction. For example, signature verification alone could be performed by system 100, results of which are provided to an application server coupled to system 100 via network interface 112, which performs the transaction.
  • It is also to be appreciated that communication bus 114 does not have to be a local bus, but rather can itself represent a network connection wherein one or more components of signature verification system 100 are located remote from one or more other components.
  • Accordingly, FIG. 1 represents a computing system wherein one or more computer programs, or software components thereof, including instructions or code for performing methodologies described herein, may be stored in one or more of the associated storage media (e.g., ROM, fixed or removable storage) and, when ready to be utilized, loaded in whole or in part (e.g., into RAM) and executed by the processor 108.
  • In any case, it is to be appreciated that methodologies described herein may be implemented in various forms of hardware, software, or combinations thereof, e.g., one or more operatively programmed general purpose digital computers with associated memory, implementation-specific integrated circuit(s), functional circuitry, etc.
  • Furthermore, as mentioned above, a function also performed by system 100 is enrollment. In accordance with the invention, system 100 performs rolling enrollment, as described below in the context of FIG. 2. Rolling enrollment enables signature verification system 100 to dynamically supplement and update an initial reference set used to verify a user in a non-intrusive manner using samples that are collected during normal signature verification sessions, i.e., during the regular sign-on process.
  • The regular authentication process proceeds as follows. Each submitted sample is compared to reference signatures (or a model or template derived from these reference signatures) for this user stored in the system (called an account) and a score is produced indicating how well the new sample matches the reference samples stored in the system. If the score is higher than a pre-selected threshold, Tr, then authentication succeeds. Otherwise, the user is invited to submit another sample, which is checked against the reference samples again. This process continues until the maximum number of trials has been exceeded. At this point, the user is subjected to an ID check and accepted if he/she passes the ID check, rejected otherwise.
  • According the present invention, as shown in verification process 200 of FIG. 2, the procedure of collecting additional reference samples runs in the background in parallel to this regular sign-on procedure. It is to be understood that the term “subject” used in the context of FIG. 2 means “user.”
  • As shown, variable N represents the number of signature sample submissions of the user (or trials). Initially, N is set to zero (step 204). MaxN represents the maximum number of trials permitted. The variable is checked after a sample submission (step 204) to determine if the maximum number of trials is reached.
  • The subject submits a signature sample in step 206. The sample is compared to the existing reference samples and a sample score is computed. The method for generating the sample score may be any known signature comparison and score generation process, e.g., based on distance metrics, etc. By way of example only, comparison and scoring methods disclosed in G. Russell et al., “Dynamic Signature Verification Using Discriminative Training,” Proceedings of the 8th International Conference on Document Analysis and Recognition (ICDAR2005), Seoul, Korea, August 2005, or in A. Kholmatov et al., “Biometric Authentication Using Online Signatures,” Lecture Notes in Computer Science ISCIS, October 2004, may be employed. The invention is not limited to any particular score generation process.
  • Whenever a submitted signature sample produces a score equal to or lower than the acceptance threshold Tr (a “no” in step 208), the score is compared to a lower threshold Tb, in step 210, and added to the candidate reference pool in step 212 if it is higher than Tb (a “yes” in step 210). Thus, Tr and Th form a threshold value range. By way of example only, Tr may be 0.8 and Tb may be 0.3. Also, variable N is incremented in step 212.
  • A purpose of the threshold Tb is to root out outlier samples caused, for example, by hardware malfunction or a poor signature rendering. If the sample score is equal to or less than Tb, the sample is discarded in step 214. In this manner, the candidate reference pool accumulates in the background until the signer is either rejected or accepted.
  • If the signer is rejected via an ID comparison (wherein an ID entered by the user is compared to a previously stored ID known to be associated with the user) in step 216, then the subject is rejected and no reference set updating is performed (step 218).
  • If the signer failed all sign-on attempts but is accepted after a positive ID check, there are two implications: (1) the signer is indeed genuine; and (2) the samples collected in the candidate reference pool represent genuine diversions from the samples already stored in the system for this signer. Thus, in this case, all samples in the candidate reference pool are added to the reference set in step 220. Note that, in this case, there is no risk of adding forgeries because of the positive ID check. We call this form of updating a “type I” update.
  • If the signer succeeds in a sign-on attempt after one or more failures, the current false rejection (FR) rate for the subject is checked to determine whether the reference set should be updated. The FR rate for each subject can be determined by keeping counts of the number of rejected samples given by the subject and divide that by the total number of signatures provided by the subject, within a given period (e.g., the past year). This rate can be updated periodically, or after each successful authentication session, and saved as an attribute associated with the subject. In such case, only samples provided during successful authentication sessions (i.e., samples that are therefore considered to be genuine) are counted.
  • Since there is no ID check involved in this case, there is always a possibility that the system accepted the signer by mistake (false acceptance or FA), thus adding reference samples in this case is a more aggressive measure and needs to be handled with caution. This is why the FR rate of each account is evaluated periodically. By definition, the FR and FA rates tend to go in opposite directions: accounts with high FR tend to have low FA, and vise versa. Adding new samples into the reference set will likely reduce the FR rate of the system, while at the same time increase the risk of a higher FA rate.
  • Based on these observations, the following rule is applied in order to reduce the possibility of adding false samples into the reference set while at the same time allowing necessary updates. If the FR rate is very low (lower than a pre-determined threshold Tfr, as compared in step 222 after a “yes” in step 208), then the subject is accepted and no reference update is performed (step 224). This is because there is no need to aggressively add new reference samples in this case. On the other hand, if the FR rate is higher than Tfr (a “yes” in step 222), then sample update is performed by adding all samples in the candidate reference pool to the reference set (step 220). This is because: (1) the high FR rate indicates that the account is in greater need of sample update; and (2) the FA rate is likely low and thus the risk of adding false samples is low. We call this form of updating a “type II” update.
  • It is to be understood that the proper value for threshold Tfr depends on the application. In a retail application, where tolerance for FR is relatively low (for fear of offending customers) but tolerance for FA is relatively high (since the transaction amount is likely small), Tfr should be a low value such as 0.05. On the other hand, in a banking application where authenticated users can make fund transfers of large amounts and, thus, low FA is more important than low FR, Tfr should be a higher value such as 0.2.
  • This strategy is also able to capture the “drift” of a signer with a small delay (the length of the evaluation cycle). That is, when the drift is significant enough to cause substantially higher FR, type II updates will be performed which, along with type I updates, will quickly add more reference samples until FR falls below the threshold again.
  • It is also possible to identify the need to add new references to the enrollment because of drift by observing the evolution of the distribution of verified authentic signatures, either in the score space, or in the feature space. While a score is typically a single number used to compare against a threshold to determine whether to accept a signature, as described above, a score space is all possible values a score can take on. On the other hand, a feature is a multidimensional representation of the characteristics of a signature and, thus, a feature space is all possible values a feature can take on. Such an observation of the evolution of the distribution of verified authentic signatures would allow detection of drift before it is significant enough to cause more false rejects.
  • Although illustrative embodiments of the present invention have been described herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various other changes and modifications may be made by one skilled in the art without departing from the scope or spirit of the invention.

Claims (17)

1. A method of adapting a signature verification system to variations in a signature of a user, comprising the steps of:
obtaining one or more signature samples from the user, the one or more obtained signature samples being submitted by the user as part of a regular authentication procedure associated with the signature verification system; and
updating a reference set of signature samples for the user through selection of one or more signature samples from the obtained signature samples, such that the updated reference set is usable by the signature verification system for verifying subsequent signature samples attributed to the user;
wherein the selection of the one or more signature samples used to update the reference set is conditioned on a false rejection rate of the user when at least one obtained signature sample of the user is authenticated and on an identification check when no obtained signature sample is authenticated.
2. The method of claim 1, wherein the reference set updating step further comprises adding at least one of the obtained signature samples to the reference set of signature samples for the user when a score associated with the obtained signature sample is not greater than a first threshold value but is greater than a second threshold value, and when the user passes the identification check.
3. The method of claim 2, wherein the user is accepted by the signature verification system when the user passes the identification check.
4. The method of claim 2, wherein the first threshold value and the second threshold value comprise a threshold value range, and wherein the first threshold value is greater than the second threshold value.
5. The method of claim 2, wherein the obtained signature sample is discarded when the score associated therewith is not greater than the second threshold value, regardless of the identification check.
6. The method of claim 1, wherein the reference set updating step further comprises adding at least one of the obtained signature samples to the reference set of signature samples for the user when the score associated with the obtained signature sample is greater than a first threshold value and when the false rejection rate associated with the user is greater than a false rejection threshold value.
7. The method of claim 6, wherein the user is accepted by the signature verification system but the reference set is not updated when the false rejection rate associated with the user is not greater than the false rejection threshold value.
8. The method of claim 1, wherein the updating step performed as part of a regular authentication procedure provides a mechanism for passively updating enrollment data of the user.
9. Apparatus for adapting a signature verification system to variations in a signature of a user, comprising:
a memory; and
a processor coupled to the memory and operative to: (i) obtain one or more signature samples from the user, the one or more obtained signature samples being submitted by the user as part of a regular authentication procedure associated with the signature verification system; and (ii) update a reference set of signature samples for the user through selection of one or more signature samples from the obtained signature samples, such that the updated reference set is usable by the signature verification system for verifying subsequent signature samples attributed to the user, wherein the selection of the one or more signature samples used to update the reference set is conditioned on a false rejection rate of the user when at least one obtained signature sample of the user is authenticated and on an identification check when no obtained signature sample is authenticated.
10. The apparatus of claim 9, wherein the reference set updating operation further comprises adding at least one of the obtained signature samples to the reference set of signature samples for the user when a score associated with the obtained signature sample is not greater than a first threshold value but is greater than a second threshold value, and when the user passes the identification check.
11. The apparatus of claim 10, wherein the user is accepted by the signature verification system when the user passes the identification check.
12. The apparatus of claim 10, wherein the first threshold value and the second threshold value comprise a threshold value range, and wherein the first threshold value is greater than the second threshold value.
13. The apparatus of claim 10, wherein the obtained signature sample is discarded when the score associated therewith is not greater than the second threshold value, regardless of the identification check.
14. The apparatus of claim 9, wherein the reference set updating operation further comprises adding at least one of the obtained signature samples to the reference set of signature samples for the user when the score associated with the obtained signature sample is greater than a first threshold value and when the false rejection rate associated with the user is greater than a false rejection threshold value.
15. The apparatus of claim 14, wherein the user is accepted by the signature verification system but the reference set is not updated when the false rejection rate associated with the user is not greater than the false rejection threshold value.
16. The apparatus of claim 9, wherein the updating operation performed as part of a regular authentication procedure provides a mechanism for passively updating enrollment data of the user.
17. An article of manufacture for adapting a signature verification system to variations in a signature of a user, comprising a machine readable medium containing one or more programs which when executed implement the steps of:
obtaining one or more signature samples from the user, the one or more obtained signature samples being submitted by the user as part of a regular authentication procedure associated with the signature verification system; and
updating a reference set of signature samples for the user through selection of one or more signature samples from the obtained signature samples, such that the updated reference set is usable by the signature verification system for verifying subsequent signature samples attributed to the user;
wherein the selection of the one or more signature samples used to update the reference set is conditioned on a false rejection rate of the user when at least one obtained signature sample of the user is authenticated and on an identification check when no obtained signature sample is authenticated.
US11/343,689 2006-01-31 2006-01-31 Method and apparatus for rolling enrollment for signature verification Abandoned US20070177773A1 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US11/343,689 US20070177773A1 (en) 2006-01-31 2006-01-31 Method and apparatus for rolling enrollment for signature verification
EP06839484A EP1989813A2 (en) 2006-01-31 2006-10-20 Method and apparatus for rolling enrollment for signature verification
PCT/US2006/060101 WO2007089356A2 (en) 2006-01-31 2006-10-20 Method and apparatus for rolling enrollment for signature verification
JP2008552302A JP5285432B2 (en) 2006-01-31 2006-10-20 Rolling registration method and apparatus for signature verification
CN2006800495879A CN101366228B (en) 2006-01-31 2006-10-20 Method and apparatus for rolling enrollment for signature verification
TW096103052A TW200809656A (en) 2006-01-31 2007-01-26 Method and apparatus for rolling enrollment for signature verification
US12/125,396 US7676069B2 (en) 2006-01-31 2008-05-22 Method and apparatus for rolling enrollment for signature verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/343,689 US20070177773A1 (en) 2006-01-31 2006-01-31 Method and apparatus for rolling enrollment for signature verification

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/125,396 Continuation US7676069B2 (en) 2006-01-31 2008-05-22 Method and apparatus for rolling enrollment for signature verification

Publications (1)

Publication Number Publication Date
US20070177773A1 true US20070177773A1 (en) 2007-08-02

Family

ID=38322130

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/343,689 Abandoned US20070177773A1 (en) 2006-01-31 2006-01-31 Method and apparatus for rolling enrollment for signature verification
US12/125,396 Expired - Fee Related US7676069B2 (en) 2006-01-31 2008-05-22 Method and apparatus for rolling enrollment for signature verification

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/125,396 Expired - Fee Related US7676069B2 (en) 2006-01-31 2008-05-22 Method and apparatus for rolling enrollment for signature verification

Country Status (6)

Country Link
US (2) US20070177773A1 (en)
EP (1) EP1989813A2 (en)
JP (1) JP5285432B2 (en)
CN (1) CN101366228B (en)
TW (1) TW200809656A (en)
WO (1) WO2007089356A2 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080037832A1 (en) * 2006-08-10 2008-02-14 Phoha Vir V Method and apparatus for choosing and evaluating sample size for biometric training process
US20090217050A1 (en) * 2008-02-26 2009-08-27 Texas Instruments Incorporated Systems and methods for optimizing signature verification time for a cryptographic cache
EP2234324A1 (en) * 2009-03-26 2010-09-29 Fujitsu Limited Method and apparatus for processing biometric information
US20130272586A1 (en) * 2012-03-28 2013-10-17 Validity Sensors, Inc. Methods and systems for enrolling biometric data
JP2014081796A (en) * 2012-10-17 2014-05-08 Hitachi Ltd Biometric authentication server and method of administering and managing biometric authentication
WO2015142731A1 (en) * 2014-03-17 2015-09-24 Sensory, Incorporated Unobtrusive verification of user identity
US11122078B1 (en) * 2020-08-14 2021-09-14 Private Identity Llc Systems and methods for private authentication with helper networks
US11138333B2 (en) 2018-03-07 2021-10-05 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11170084B2 (en) 2018-06-28 2021-11-09 Private Identity Llc Biometric authentication
US11210375B2 (en) 2018-03-07 2021-12-28 Private Identity Llc Systems and methods for biometric processing with liveness
US11265168B2 (en) 2018-03-07 2022-03-01 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11362831B2 (en) 2018-03-07 2022-06-14 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11392802B2 (en) 2018-03-07 2022-07-19 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11394552B2 (en) 2018-03-07 2022-07-19 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11489866B2 (en) * 2018-03-07 2022-11-01 Private Identity Llc Systems and methods for private authentication with helper networks
US11502841B2 (en) 2018-03-07 2022-11-15 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11789699B2 (en) 2018-03-07 2023-10-17 Private Identity Llc Systems and methods for private authentication with helper networks

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070177773A1 (en) 2006-01-31 2007-08-02 International Business Machines Corporation Method and apparatus for rolling enrollment for signature verification
JP4936513B2 (en) * 2006-04-28 2012-05-23 キヤノン株式会社 Image processing apparatus, image processing method, sign registration program, and storage medium
CN103532910B (en) * 2012-07-03 2018-06-15 北京三星通信技术研究有限公司 The signature authentication method and apparatus of a kind of electronic equipment
CN103455741B (en) * 2013-09-06 2017-02-01 武汉汉德瑞庭科技有限公司 Character-based on-line handwriting authentication template extension method
KR102139795B1 (en) * 2014-12-15 2020-07-31 삼성전자주식회사 Method for updating biometric feature pattern and the electronic device therefor

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4724542A (en) * 1986-01-22 1988-02-09 International Business Machines Corporation Automatic reference adaptation during dynamic signature verification
US5553156A (en) * 1994-04-12 1996-09-03 Nippondenso Co., Ltd. Signature recognition apparatus which can be trained with a reduced amount of sample data
US5559895A (en) * 1991-11-08 1996-09-24 Cornell Research Foundation, Inc. Adaptive method and system for real time verification of dynamic human signatures
US5761330A (en) * 1995-06-07 1998-06-02 Mytec Technologies, Inc. Hybrid optical-digital method and apparatus for fingerprint verification
US5802200A (en) * 1995-03-29 1998-09-01 Siemens Aktiengesellschaft Method for determining a reference autograph character string on the basis of a set of sample autograph character strings from the same writer
US5999637A (en) * 1995-09-28 1999-12-07 Hamamatsu Photonics K.K. Individual identification apparatus for selectively recording a reference pattern based on a correlation with comparative patterns
US6424728B1 (en) * 1999-12-02 2002-07-23 Maan Ammar Method and apparatus for verification of signatures
US6430305B1 (en) * 1996-12-20 2002-08-06 Synaptics, Incorporated Identity verification methods
US6591224B1 (en) * 2000-06-01 2003-07-08 Northrop Grumman Corporation Biometric score normalizer
US6655585B2 (en) * 1998-05-11 2003-12-02 Citicorp Development Center, Inc. System and method of biometric smart card user authentication
US6826306B1 (en) * 1999-01-29 2004-11-30 International Business Machines Corporation System and method for automatic quality assurance of user enrollment in a recognition system
US20050223234A1 (en) * 2002-01-19 2005-10-06 Mcowan Peter W Authentication systems
US20060093190A1 (en) * 2004-09-17 2006-05-04 Proximex Corporation Adaptive multi-modal integrated biometric identification detection and surveillance systems
US20080037832A1 (en) * 2006-08-10 2008-02-14 Phoha Vir V Method and apparatus for choosing and evaluating sample size for biometric training process

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0729001A (en) * 1993-07-07 1995-01-31 Toshiba Corp Individual identification device
JP3564984B2 (en) * 1997-12-02 2004-09-15 オムロン株式会社 Personal identification device and personal identification method
JP3808639B2 (en) * 1998-10-13 2006-08-16 株式会社東芝 Signature verification method and apparatus
JP2001338301A (en) * 2000-05-30 2001-12-07 Canon Inc Device and method for authenticating signature, and storage medium with signature authentication program stored therein
JP4645872B2 (en) * 2000-11-29 2011-03-09 オムロン株式会社 Control device and authentication method
JP2002259980A (en) * 2001-03-05 2002-09-13 Omron Corp Device, system and method for organism collation, and method for updating registered data
US7426382B2 (en) * 2002-10-09 2008-09-16 Motorola, Inc. Contact validation and trusted contact updating in mobile wireless communications devices
JP2005063297A (en) * 2003-08-19 2005-03-10 Seiko Precision Inc Fingerprint authentication method
JP4656388B2 (en) * 2005-01-19 2011-03-23 ソニー株式会社 Authentication device, update time detection method and program
JP4646731B2 (en) * 2005-08-08 2011-03-09 シャープ株式会社 Portable information terminal device
US20070177773A1 (en) 2006-01-31 2007-08-02 International Business Machines Corporation Method and apparatus for rolling enrollment for signature verification

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4724542A (en) * 1986-01-22 1988-02-09 International Business Machines Corporation Automatic reference adaptation during dynamic signature verification
US5559895A (en) * 1991-11-08 1996-09-24 Cornell Research Foundation, Inc. Adaptive method and system for real time verification of dynamic human signatures
US5553156A (en) * 1994-04-12 1996-09-03 Nippondenso Co., Ltd. Signature recognition apparatus which can be trained with a reduced amount of sample data
US5802200A (en) * 1995-03-29 1998-09-01 Siemens Aktiengesellschaft Method for determining a reference autograph character string on the basis of a set of sample autograph character strings from the same writer
US5761330A (en) * 1995-06-07 1998-06-02 Mytec Technologies, Inc. Hybrid optical-digital method and apparatus for fingerprint verification
US5999637A (en) * 1995-09-28 1999-12-07 Hamamatsu Photonics K.K. Individual identification apparatus for selectively recording a reference pattern based on a correlation with comparative patterns
US6430305B1 (en) * 1996-12-20 2002-08-06 Synaptics, Incorporated Identity verification methods
US6655585B2 (en) * 1998-05-11 2003-12-02 Citicorp Development Center, Inc. System and method of biometric smart card user authentication
US6826306B1 (en) * 1999-01-29 2004-11-30 International Business Machines Corporation System and method for automatic quality assurance of user enrollment in a recognition system
US6424728B1 (en) * 1999-12-02 2002-07-23 Maan Ammar Method and apparatus for verification of signatures
US6591224B1 (en) * 2000-06-01 2003-07-08 Northrop Grumman Corporation Biometric score normalizer
US20050223234A1 (en) * 2002-01-19 2005-10-06 Mcowan Peter W Authentication systems
US20060093190A1 (en) * 2004-09-17 2006-05-04 Proximex Corporation Adaptive multi-modal integrated biometric identification detection and surveillance systems
US20080037832A1 (en) * 2006-08-10 2008-02-14 Phoha Vir V Method and apparatus for choosing and evaluating sample size for biometric training process

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8600119B2 (en) * 2006-08-10 2013-12-03 Louisiana Tech University Foundation, Inc. Method and apparatus to relate biometric samples to target FAR and FRR with predetermined confidence levels
US9064159B2 (en) 2006-08-10 2015-06-23 Louisiana Tech University Foundation, Inc. Method and apparatus to relate biometric samples to target FAR and FRR with predetermined confidence levels
US7809170B2 (en) * 2006-08-10 2010-10-05 Louisiana Tech University Foundation, Inc. Method and apparatus for choosing and evaluating sample size for biometric training process
US20080037832A1 (en) * 2006-08-10 2008-02-14 Phoha Vir V Method and apparatus for choosing and evaluating sample size for biometric training process
US20100315202A1 (en) * 2006-08-10 2010-12-16 Louisiana Tech University Foundation, Inc. Method and apparatus for choosing and evaluating sample size for biometric training process
US7986818B2 (en) * 2006-08-10 2011-07-26 Louisiana Tech University Foundation, Inc. Method and apparatus to relate biometric samples to target FAR and FRR with predetermined confidence levels
US20110222741A1 (en) * 2006-08-10 2011-09-15 Louisiana Tech University Foundation, Inc. Method and apparatus to relate biometric samples to target far and frr with predetermined confidence levels
US20090217050A1 (en) * 2008-02-26 2009-08-27 Texas Instruments Incorporated Systems and methods for optimizing signature verification time for a cryptographic cache
US8874920B2 (en) * 2008-02-26 2014-10-28 Texas Instruments Incorporated Verifying cryptographic signature from stored primitives of previously received signature
US20100275258A1 (en) * 2009-03-26 2010-10-28 Fujitsu Limited Method and apparatus for processing biometric information
US8862890B2 (en) * 2009-03-26 2014-10-14 Fujitsu Limited Method and apparatus for processing biometric information
EP2234324A1 (en) * 2009-03-26 2010-09-29 Fujitsu Limited Method and apparatus for processing biometric information
US20130272586A1 (en) * 2012-03-28 2013-10-17 Validity Sensors, Inc. Methods and systems for enrolling biometric data
US9600709B2 (en) * 2012-03-28 2017-03-21 Synaptics Incorporated Methods and systems for enrolling biometric data
US10346699B2 (en) 2012-03-28 2019-07-09 Synaptics Incorporated Methods and systems for enrolling biometric data
JP2014081796A (en) * 2012-10-17 2014-05-08 Hitachi Ltd Biometric authentication server and method of administering and managing biometric authentication
WO2015142731A1 (en) * 2014-03-17 2015-09-24 Sensory, Incorporated Unobtrusive verification of user identity
US10248770B2 (en) 2014-03-17 2019-04-02 Sensory, Incorporated Unobtrusive verification of user identity
US11489866B2 (en) * 2018-03-07 2022-11-01 Private Identity Llc Systems and methods for private authentication with helper networks
US11392802B2 (en) 2018-03-07 2022-07-19 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11762967B2 (en) 2018-03-07 2023-09-19 Private Identity Llc Systems and methods for biometric processing with liveness
US11210375B2 (en) 2018-03-07 2021-12-28 Private Identity Llc Systems and methods for biometric processing with liveness
US11265168B2 (en) 2018-03-07 2022-03-01 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11138333B2 (en) 2018-03-07 2021-10-05 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11362831B2 (en) 2018-03-07 2022-06-14 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11789699B2 (en) 2018-03-07 2023-10-17 Private Identity Llc Systems and methods for private authentication with helper networks
US11394552B2 (en) 2018-03-07 2022-07-19 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11943364B2 (en) 2018-03-07 2024-03-26 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11502841B2 (en) 2018-03-07 2022-11-15 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11640452B2 (en) 2018-03-07 2023-05-02 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11677559B2 (en) 2018-03-07 2023-06-13 Private Identity Llc Systems and methods for privacy-enabled biometric processing
US11170084B2 (en) 2018-06-28 2021-11-09 Private Identity Llc Biometric authentication
US11783018B2 (en) 2018-06-28 2023-10-10 Private Identity Llc Biometric authentication
US20220078206A1 (en) * 2020-08-14 2022-03-10 Private Identity Llc Systems and methods for private authentication with helper networks
US11790066B2 (en) * 2020-08-14 2023-10-17 Private Identity Llc Systems and methods for private authentication with helper networks
US11122078B1 (en) * 2020-08-14 2021-09-14 Private Identity Llc Systems and methods for private authentication with helper networks

Also Published As

Publication number Publication date
CN101366228A (en) 2009-02-11
JP2009525634A (en) 2009-07-09
US7676069B2 (en) 2010-03-09
CN101366228B (en) 2011-11-09
TW200809656A (en) 2008-02-16
EP1989813A2 (en) 2008-11-12
WO2007089356A2 (en) 2007-08-09
US20080219519A1 (en) 2008-09-11
JP5285432B2 (en) 2013-09-11
WO2007089356A3 (en) 2008-04-24

Similar Documents

Publication Publication Date Title
US7676069B2 (en) Method and apparatus for rolling enrollment for signature verification
US10777030B2 (en) Conditional and situational biometric authentication and enrollment
US8020005B2 (en) Method and apparatus for multi-model hybrid comparison system
US8700557B2 (en) Method and system for association and decision fusion of multimodal inputs
JP4939121B2 (en) Methods, systems, and programs for sequential authentication using one or more error rates that characterize each security challenge
US20020184538A1 (en) Combined authentication system
JP2017524998A (en) Method and system for performing identity verification
AU2017316312A1 (en) Remote usage of locally stored biometric authentication data
US20150113634A1 (en) Biometric verification
US10970573B2 (en) Method and system for free text keystroke biometric authentication
Marasco et al. Biometric multi‐factor authentication: On the usability of the FingerPIN scheme
US20070233667A1 (en) Method and apparatus for sample categorization
JP5422326B2 (en) Biometric authentication device
Rudrapal et al. Improvisation of biometrics authentication and identification through keystrokes pattern analysis
JP6346359B1 (en) Signature verification system
JP6199470B1 (en) Signature authentication system
Barghouthi Keystroke Dynamics. How typing characteristics differ from one application to another
Panasiuk et al. A modified algorithm for user identification by his typing on the keyboard
US20220294783A1 (en) Identity management using remote authentication
CN115497146B (en) Model training method and device and identity verification method and device
US20230230088A1 (en) Method and System of Predictive Document Verification and Machine Learning Therefor
Pavaday et al. Enhancing performance of Bayes classifier for the hardened password mechanism
Haliru Assessment of Biometric Technology on Performance of Selected Depositmoney Banks in Kaduna State, Nigeria
TW202409929A (en) Cardless finance transaction system and its host server
JP2003091729A (en) Scaling method of similarity for biometric method and device and program product

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HU, JIANYING;RUSSELL, GREGORY FRASER;REEL/FRAME:017634/0927

Effective date: 20060503

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE