Definition

signature analysis

Part of the Authentication glossary:

Signature analysis is either of two distinct processes.

1. Signature analysis is the scrutinizing of human signatures in order to detect forgeries. The analysis of a human signature involves the use of specialized software to evaluate not only the contours, but the movements originally made to create, a signature. Forged signatures tend to be produced more slowly than genuine ones. Even if the author speeds up the forgery process, it is impossible to duplicate the motion-versus-time function that would take place in a genuine signature. The software can also compare multiple signatures. Because of the variations found in a single person's multiple signatures, any electronically captured signature can only be used once. Two identical signatures suggest that at least one of them represents an attempt at fraud.

Human signature analysis is used in the banking, government, insurance, and health-care industries, and has gained popularity in recent years as a tool to combat identity theft.

2. In analog electronics, signature analysis is a troubleshooting technique in which an AC (alternating-current) signal with a specific waveform (usually a sine wave) is applied across a component. The resulting current-versus-voltage characteristic, called the analog signature, is rendered on an oscilloscope, with current displayed along the vertical axis and voltage displayed along the horizontal axis. The resulting analog signature is unique for each particular type of "healthy" component (resistor, capacitor, or diode, for example). Any deviation from the normal signature strongly suggests the existence of a fault in that component.

Analog signature analysis is used in complex electronic systems to troubleshoot printed-circuit boards to the component level.

This was last updated in May 2012
Posted by: Margaret Rouse

Related Terms

Definitions

  • time-based one-time password (TOTP)

    - A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to computer systems. (SearchConsumerization.com)

  • BYOI (bring your own identity)

    - BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon. (SearchSecurity.com)

  • John the Ripper

    - John the Ripper is a popular free password cracking tool that combines several different cracking programs and runs in both brute force and dictionary attack modes. Originally developed for Unix-de... (WhatIs.com)

Glossaries

  • Authentication

    - Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question About signature analysis Powered by ITKnowledgeExchange.com

Get answers from your peers on your most technical challenges

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.