Sign In to Follow Application
View All Documents & Correspondence

E Signature Verification

Abstract: Python is used to verify signatures, and fashion mnist is the result. On a daily basis, customers are growing in all areas, including banks and hospitals. It appears that obtaining information from each'user is really difficult. We've devised a method of obtaining the user's data via their manual signing. An application scans the user's manual signature with a camera, examining and identifying the right user based on their signature, and displaying the information with the user's acknowledgement by sending an OTP confirmation for security. By utilizing this technology, the user's specific information can be discovered. In the event of an emergency, we do not need to bring any proof associated with the user's information. In the event of an emergency, we do not need to bring any proof associated with the user's information. Errors can be avoided instead of manually gathering data because the data is already stored. The data will only be accessed with the user's permission; phone signatures will not be used. Using this application, anyone can save time.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
29 August 2022
Publication Number
09/2024
Publication Type
INA
Invention Field
BIO-CHEMISTRY
Status
Email
Parent Application

Applicants

RENISHA S
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
SARANYA N
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
UDHAYA S U
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
ARTHI M
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
DHAKSATA S
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
PADMASHREE A
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.

Inventors

1. RENISHA S
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
2. SARANYA N
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
3. UDHAYA S U
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
4. ARTHI M
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.
5. DHAKSATA S
DEPATMENT OF COMPUTER SCIENCE AND ENGINEERING, BANNARI AMMAN INSTITUTE OF TECHNOLOGY, SATHYAMANGALAM, ERODE(DT), TAMILNADU - 638401.

Specification

TOPIC
E-SIGN VERIFICATION
FIELD OF STUDY
Artificial Intelligence and Data Science
BACKGROUND AND PROBLEM IN THE PRIOR ART
The main objective of this invention is to get details of the user by their signature. The first aspect of this innovation is to recognize and identify the signature of the user. With the acknowledgement of the user we can access their information by sending OTP confirmation for user's safety.
The few researches allied to the above said inventions are listed below:
Patent No : CN107463806B The invention relates to a signature and signature verification method for an Android application program installation package, which comprises the following steps: acquiring developer identity information and developer public key information; signing the acquired information by adopting a private key of a developer to obtain first signature information; the third party organization verifies the identity information, the public key information and the first signature information of the developer, and if the identity information, the public key information and the first signature information of the developer pass the - . verification, a first digital certificate is generated by adopting a CA private key; adding the first digital certificate to a source program file; and signing the Android program source file by adopting a developer public key and a developer private key to generate a second digital certificate and generate an APK file. The identity of the

developer is authenticated through the digital certificate, and no additional signature tool or signature verification tool is required to be added, so that the cost is saved; in addition, the digital certificate for authenticating the identity of the developer is placed in the APFC file and cannot be deleted, so that the method is safer and more reliable.
Patent No : CN 108777625B The invention discloses a signature verification method, a signature verification device, a signature verification system, a storage medium and an electronic device. Wherein, the method comprises the following steps: acquiring a first request of a target account, wherein the first request is used for initiating a transaction event; sending a second request to a plurality of first nodes in the blockchain. wherein the second request is used for acquiring the signatures of the plurality of first nodes on the transaction event; acquiring signatures of the transaction events returned by the plurality of first nodes in response to the second requests; the signature of the transaction event by the plurality of first nodes is verified by the plurality of second nodes. The invention solves the technical problem of lower efficiency of verifying endorsement signatures in the related technology.
Patent No : CN107342867B The invention discloses a signature verification method and a signature verification device. The signature verification method can comprise the steps of receiving a signature request, wherein the signature request comprises summary information of a file and sender identification; generating a random number; generating a signature of the file based on the random number, the summary information and the sender identification according to a signature generation algorithm; and storing the signature in a blockchain and returning the random number to a sender sending the signature request. By using the technical scheme of

the disclosure, the electronic signature can be realized under the condition of no U shield.
Patent No : US 11171782B2 Disclosed are a system and techniques for identity and electronic signature verification that utilizes blockchain technology. An enterprise system enables computing devices to engage the enterprise and prospective users for the purposes of executing a document or a smart contract. Users may obtain a computer application from an enterprise system and may utilize the computer application to retrieve a document or select a smart contract. The identity of all users who execute the document may be verified based on an authentication by a trusted independent system. Information related to the respective signers, the document or smart contract, and the authentication may be stored as transactions in a blockchain. The transactions may be stored in the blockchain under a user's address, a document or smart contract address, or a digital wallet, if available.
Patent No : 1CR10213954B1 The method of updating a firmware of a device included in a mobile system according to the present invention includes receiving a first hash value and a signature generated from a firmware image provided from a host, and using the first hash value and the signature to obtain the firmware image Executing a pre-verification operation for integrity or signature authentication, receiving the firmware image from the host according to the result of the pre-verification operation, and calculating a second hash value from the received firmware image to calculate integrity And executing a post verification operation to perform verification.
The above slated abstract of the individual patent provides solution for the new design construction .theory about data science based sign identification

The invention has a different perspective of the above-stated inventions by integrating and designing a new concept completely by getting the user's details with the help ofsignature.lt displays the user information by recognizing their signature.
The novel features of this invention are:
• To scan the manual signature of the user through an application.
• To analyze and recognize the appropriate user by their sign.
• To display the details with the acknowledgment of the user by sending OTP confirmation for their safety.
OBJECTIVE OF INVENTION
• One object of the invention is to design an application that scans the manual sign of the user.
• Another object of the invention is to analyze and recognize the signature. After the verification through OTP the details of the user will be displayed.
SUMMARY OF THE INVENTION
Signatures remain an essential biometric attribute since they are still commonly employed to verify human identification. Handwritten signatures are a crucial part of today's rule-based society. Identity-Congruent Behavior is Promoted by Simply Signing One's Name. We propose that signing one's name serves as a general self-identity prime, promoting conduct that is consistent with the specific component of one's self-identity that the scenario provides. Signature verification technique uses python. Customers are expanding in every area, such as banks and hospitals, on a daily basis. Getting information from each user appears 10 be really challenging.

We've come up with a way to obtain the user's information via their manual signature. Here an application uses a camera to scan the user's manual signature which examines and identifies the proper user based on their signature and displays the information with the user's acknowledgement by sending an OTP confirmation for their security. The precise information of the user can be identified by executing this technology. We do not need to carry any proof connected to the user's details in the event of an emergency. Because the data is already kept, errors can be avoided rather than collecting it manually. The data will only be accessed by the user's acknowledgement, it will not be misused by employing their phony signatures. Everyone can save time by using this application.
BRIEF DESCRIPTION OF DRAWING
FIG. \ represents the design of the invention

DETAILED DESCRIPTION OF THE DRAWING
In Fig. 1, |l| to create an application that scans the user's manual signature.|2| recognizes the appropriate user by their signature. With the user's acknowledgement by issuing an OTP confirmation^] the information is displayed |4| for their security.
DETAILED DESCRIPTION OF THE INVENTION
Because signatures are still used to validate human identity, they remain an important biometric feature. In today's rule-based society, handwritten signatures are essential. Simply signing one's name encourages identity-congruent behavior. We propose that signing one's name serves as a broad self-identity prime, encouraging behavior compatible with the scenario's specific component of self-identity. Python is used in the signature verification technique, as is fashion ninist. On a daily basis, customers are expanding in all areas, such as banks and hospitals. Obtaining information from each user appears to be a difficult task. We've devised a method of obtaining the user's information through their manual signing. An application scans the user's.manual signature with a camera, examining and identifying the correct user based on their signature, and displaying the information with the user's approval by providing an OTP confirmation for their security. This technique can be used to identify the user's precise information. In the event of an emergency, we do not need to carry any proof related to the user's information. Instead of gathering data manually, errors can be avoided because the data is already saved. The data will only be accessed with the user's permission; it will not be abused by using forged signatures. This application can help anyone save time.
TECHNICAL DETAILS
The experimental protocol for this project is designed and described as follows: 1. The user's signature is obtained.

2. The signature has been validated.
3. The user's information is displayed after the OTP is sent.

Documents

Application Documents

# Name Date
1 202241049168-Form-1_As Filed_29-08-2022.pdf 2022-08-29
2 202241049168-Form 2(Title Page)_Complete_29-08-2022.pdf 2022-08-29
3 202241049168-Drawing_As Filed_29-08-2022.pdf 2022-08-29
4 202241049168-Description Complete_As Filed_29-08-2022.pdf 2022-08-29
5 202241049168-Correspondence_As Filed_29-08-2022.pdf 2022-08-29
6 202241049168-Claims_As Filed_29-08-2022.pdf 2022-08-29
7 202241049168-Abstract_As Filed_29-08-2022.pdf 2022-08-29