What is the process of Signature Verification in information security?


A biometric technique that uses characteristics of a person’s signature (such as pressure, pen lifts, speed and direction of pen strokes) to authenticate identity. Signature is less efficient than some multiple biometrics (e.g., fingerprints, iris) but is famous in file authentication applications that have been used written signatures. Some growth can be fueled by the maintenance of pen-based devices (e.g., the PalmPilot) that can match as a signature input tablet.

Signature verification technology is the determination of an individual’s written signature, such as the speed, acceleration cost, stroke length and pressure applied during the signature. There are diverse approach to capture information for analysis i.e. a special pen can be used to recognize and examine analyze several movements when writing a signature, the data will be acquired within the pen.

Information can also be captured between a special tablet that gauges time, pressure, acceleration and the duration the pen touches it. As the user writes on the tablet, the movement of the pen process sound against paper is used for verification. An individual’s signature can change over time, though, which can effect in the system not recognizing authorized users.

Signature systems based on the device including special tablet, a special pen etc. When the user signs the name on a digital pad, rather than merely comparing signatures, the device instead compares the direction, speed and pressure of the writing instrument as it change across the pad.

A digital signature is a mathematical methods which validates the authenticity and integrity of a message, software or digital files. It enables us to check the author name, date and time of signatures, and authenticate the message text. The digital signature provides far more inherent security and intended to solve the issue of tampering and impersonation (Intentionally copy another person's characteristics) in electronic communications.

The computer-based business data authentication interrelates both technology and the law. It also calls for cooperation among the people of multiple professional backgrounds and location of expertise. The digital signatures are different from other digital signatures not only in terms of phase and result, but also it creates digital signatures more serviceable for legal goals. Some digital signatures that legally recognizable as signatures cannot be secure as digital signatures and can lead to uncertainty and disputes.

In approval signature, it can be used in the organization's business architecture. They provide to optimize the organization's approval process. The process includes capturing approvals create by us and other individuals and embedding them inside the PDF files. The approval signatures to include details including an image of our physical signature, location, date, and official seal.

Updated on: 04-Mar-2022

323 Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements