Payment processing device signature verification

ABSTRACT

Devices and methods for signature authentication of a bearer of a payment processing device during financial transactions are provided. The payment processing device is provided with a signature input panel configured to receive user input signature information for the purpose of authenticating the signature. After the bearer of the payment processing device writes her signature into the signature input panel, the input signature information is compared to a pre-stored signature profile stored in the payment processing device for authentication.

CROSS-REFERENCE TO RELATIONS APPLICATIONS

None

FIELD OF THE INVENTION

Aspects and embodiments of the present invention relate in general toauthentication of the identity of the bearer of a payment processingdevice, such as a credit card, during financial transactions. Morespecifically, aspects of the present invention provide methods andpayment processing devices for authentication of a user throughvalidation of the user's signature to prevent fraudulent use duringfinancial transactions.

BACKGROUND

Currently, a variety of devices and methods have been developed in anattempt to improve authentication fidelity and to safeguard personalidentity and sensitive private information. These devices and methodshave grown in importance in light of the increasing security threat dueto the rapid advancements in networking and mobile communicationtechnologies. However, certain authentication technologies in use todayare still based on the traditional “knowledge-based factor” or“possession-based factor” identification and verification approaches. Ina typical knowledge-based authentication approach, only oneauthentication factor (such as knowledge of a password) is required inorder to gain access to a system. In a possession-based authenticationapproach, possession of one authentication factor (e.g. possession ofcard or token) is required in order to gain access to a system. Morerecently, some of these technologies have been deployed in combinationas two factor authentication schemes wherein both knowledge-based andpossession-based factors are required simultaneously for authentication.These types of authentications have recently gained increasingacceptance. An example of such authentication scheme is the common bankcard transaction wherein the card itself represents the authorizingpossession factor (bearer has the card). The corresponding passwordrepresents the authorizing factor that is known only to the accountholder. However, despite these apparent additional layers of security,misplacement of the possession factor (such as lost or stolen cards) anda breach of the knowledge factor (such as compromised password) remainproblematic for these types of transactions. As a result, when thepossession factor (e.g. card) and the password are simultaneouslycompromised or duplicated, there is no apparent suitable countermeasurefor the breach as this technique cannot reliably authenticate the trueidentity of the holder of the device.

In a typical financial transaction using the traditional two factorverification system, a bearer of a typical payment processing device(e.g. credit card) presents the card to a merchant for the purchase ofan item. The merchant takes the card presented by the bearer and swipesthe card through a magnetic strip card reading device or other similardevice. The information contained on the magnetic strip of the card isread and transmitted to the issuing financial institution. The financialinstitution then interrogates its database of active cards to theinformation received. The institution also verifies whether the amountof credit sought exceeds the amount available. If the financialinstitution verifies that the card is active and that the credit limitwill not be exceeded (for a credit transaction) or that there aresufficient funds to complete the transaction (for a debit transaction),and/or other verification parameters are satisfactorily authenticated,an approval is provided to the merchant for completion of the purchase.

After an approval is determined by the financial institution, anauthorization code is prepared and transmitted to the merchant. Themerchant returns the card to the bearer after the authorization code hasbeen received and the merchant then requires a signature from thebearer, authorizing the transaction. The bearer of the card signs asales slip. The merchant verifies the signature of the bearer against asignature on the back of the card and the transaction is then complete.

Within these conventional authentication schemes, verification of thetransaction occurs at two points in the transaction. The firstauthorization occurs at the financial institution that issues the card,wherein an electronic database is used to check valid card numbers. Thesecond authorization occurs at the merchant where the signatureverification is performed. Merchants, however, may forget to compare thesignature obtained from the individual against the signature on the backof the card. Another problem is that the merchants generally do not havethe facility to accurately compare the signature on the back of the cardto the signature obtained from the bearer of the card to determine thatthe signatures were made by one individual. Currently, conventionalcards do not have a capability to provide the merchant withauthentication of the identity of the bearer apart from comparing thesignatures.

In light of these security risks, the use of portable payment processordevices (e.g. credit cards) by un-authorized bearers continues topresent a difficult and costly problem for financial institutions.

SUMMARY OF THE INVENTION

According to an embodiment, a payment processing device is disclosed.The payment processing device comprises a signature input panel that isconfigured to receive input signature information from a user. Aprocessor (e.g. a logic chip) is also provided in the payment processingdevice. The processor is coupled to the signature input panel andconfigured to perform authentication of the input signature by comparingthe input signature information against a pre-stored user signatureprofile that is stored within the payment processing device. The paymentprocessing device further comprises a display unit coupled to theprocessor for displaying a message representing the results of theauthentication of the input signature information.

Aspects of the invention also provide a method of authenticating abearer of the payment processor device (hereinafter called “user”) for afinancial transaction. A payment processing device to be used by theuser for a financial transaction is provided and before the financialtransaction can be approved, a user input signature information isreceived by a signature input panel provided in the payment processingdevice. Then, the payment processing device authenticates the user inputsignature information by comparing the user input signature informationto a pre-stored user signature profile. The results of theauthentication of the user input signature information is displayed on adisplay unit provided in the payment processing device.

Other systems, methods, and/or products will be or become apparent toone of ordinary skill in the art upon review of the following drawingsand detailed description. It is intended that all such additionalsystems, methods, and/or products be included within this description,be within the scope of the present invention, and be protected by theaccompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration of a payment processing device according toone embodiment.

FIG. 2 is a schematic view of components within a payment processingdevice embodiment.

FIG. 3 is a schematic illustration of an example of a power source forthe payment processing device.

FIG. 4 is a schematic illustration of another example of the powersource for the payment processing device.

FIG. 5 is a schematic illustration of an aspect of the structure of asignature input panel according to an embodiment.

FIG. 6 is a flow chart of an exemplary method for verifying thesignature of a bearer of a payment processor card.

FIG. 7 is a flow chart of another exemplary method of verifying thesignature of a bearer of a payment processor card.

DETAILED DESCRIPTION

According to one embodiment, a card (e.g. credit card, debit card,prepaid card or the like) embodiment of a payment processor device 100for conducting financial transactions is illustrated in FIG. 1. The card100 is provided with individual components so financial transactions maybe accomplished in a safe, secure, and convenient process.

The card 100, has two faces and FIG. 1 shows one of the two faces thatis generally referred to as the back side 202 of the card 100. On theopposite face (not shown) of the card 100, a card serial number can beprovided, wherein the serial number is a unique identifier for the card100. The serial number can comprise letters or a combination of numbers,letters and symbols.

The back side 202 of the payment processor card 100 is provided with acommunication element 200. In the illustrated example, the communicationelement 200 is a magnetic strip that is used to identify the card 100through a conventional magnetic strip reader. In other embodiments (notshown), the communication element 200 may be a wireless radio frequency(RF) transmitter, an optical transmitter, or other communication device.

In addition to the magnetic strip 200, a hologram 204 can be provided onat least one face of the card 100 to allow a merchant to visuallyidentify that the card 100 has been officially produced by the issuinginstitution. A security code feature 208 is also provided at the back ofthe card 100 for further identification purposes if needed. The card 100is provided with a signature input panel 210 that is configured tocapture the characteristic parameters of a signature written on it. Thissignature input panel 210 is not a mere blank space where the cardowner's signature is written in visible ink, as on a conventional creditcard. Rather, the signature input panel 210 may be a pressure-sensitivedata input device on which a signature is written with a stylus, whichmay be similar to those commonly used on many personal digital assistantdevices (PDAs) and point-of-sale payment devices. The signature inputpanel 210 captures multiple characteristic parameters about thesignature.

In other embodiments, the signature input panel may be based on any of avariety of input device technologies, such as resistive, surfaceacoustic wave, capacitive, infrared, strain gauge, optical imaging,dispersive signal technology, or the like.

FIG. 2 is a schematic illustration of the components of the card 100. Inthe illustrated embodiment, a power source 220 (e.g., a battery) isconnected to a signature input panel 210 that in turn is connected to aprocessor (e.g. a logic chip) 218. The power source 220 is connected byappropriate wirings (not shown) to supply electrical power to variousother components of the card 100. The power source 220 is configured toprovide sufficient electrical current to operate the signature inputpanel 210 and the processor 218 to function for authentication purposes.In one embodiment, the power source 220 provided on the paymentprocessing device 100 may be a rechargeable thin film type battery witha photovoltaic layer for charging the thin film battery. FIG. 3 is aschematic block diagram illustrating such example of the power source220. The power source 220 comprises a capacitor 222 configured to supplyelectrical power to the processor 218 as well as other components of thecard 100 when necessary. A piezo pad 224 is connected to the capacitor222 for providing electricity to recharge the capacitor 222. Duringnormal handling of the card 100, the card 100 gets flexed back and forthand also flexes the piezo pad 224. When the piezo pad 224 is flexed, itgenerates electricity and charges the capacitor 222. The piezo pad 224can also be connected directly to the processor 218 and provides powerto the processor 218 as well as other components of the card 100. Thepiezo pad 224 may be positioned along any section of the card 100 andmay be provided as a surface feature of the card 110 or embedded withinthe body of the card 100.

In another embodiment, the power source 220 may be a rechargeable thinfilm type battery 232 with a photovoltaic layer 234 for charging thethin film battery 232 as illustrated in FIG. 4. The thin film battery232 and the photovoltaic layer 234 may be laminated together on to thecard 100. The photovoltaic layer 234 converts the light that strikes thephotovoltaic layer 234 into electrical energy that can be stored in therechargeable thin film battery 232 provided underneath the photovoltaiclayer 234. The photovoltaic layer 234 may be appropriately positioned onthe card 100 to be exposed to light during normal use of the card 100and has a surface area optimized to capture sufficient amount of lightto generate electricity.

In some embodiments, the power source 220 includes an internal batteryhaving a battery life expected to last until or beyond the expirationdate of the card 100. In other embodiments (not shown), power and groundcontacts may be provided at the front or back surface of the card 100 toreceived power from an external power source. An external power sourcemay be used to recharge an internal battery or to operate on externalpower.

The signature input panel 210 is configured such that a person bearingthe card 100 provides her signature information (the “input signatureinformation”) to the processor 218 by writing her signature in thesignature input panel 210. The processor 218 is configured withappropriate data storage memory (whether it be provided as a separatememory chip connected to the processor or provided on the processor chipitself to store the input signature information as well as any otherinformation necessary to carry out the operation of the paymentprocessing device 100 according to the methods disclosed herein.

Once the input signature information is provided to the processor 218,the processor 218 performs an authentication of the input signatureinformation by comparing the input signature information against theauthorized card owner's signature profile that is pre-stored in theprocessor's memory. If the authentication check indicates that the inputsignature information matches the pre-stored signature profile, theprocessor 218 displays a message on the display unit 209 that the cardbearer's signature has been verified against the signature profile ofthe authorized card owner. The merchant can then safely allow the cardbearer to pay for the service/goods using the card 100. When the paymentprocessing device 100 is presented, the preferred business protocol forthe merchants would be to only allow the card bearer to use the paymentprocessing device 100 for payment if the card bearer's signature issuccessfully authenticated by the payment processing device 100 in thismanner.

According to another optional feature, the magnetic strip 200 providedon the card 100 can be an active magnetic strip that can be activatedand deactivated by the processor 218. The term, “Active magnetic strip”refers to a magnetic strip that allows the magnetic data encoded thereonto be read by a card reader only when the magnetic strip 200 isactivated. When the magnetic strip 200 is de-activated, the card readerwill not be able to access the data stored on the magnetic strip 200.Thus, a card 100 provided with such active-type magnetic strip 200 canbe configured so that the magnetic strip 200 is normally in ade-activated state and activated by the processor 218 only when the cardbearer's input signature information has been authenticated. In someembodiments, the activation of the active magnetic strip 200 would betemporary and would last only for a pre-determined length of time andthen the magnetic strip 200 would automatically return to a deactivatedstate. The processor 218 can control the supply of power from the powersource 220 to the active magnetic strip 200. This feature can be used toadd an additional level of security so that if the input signatureinformation from the card bearer is not authenticated by the processor218, the card 100 will not be useable. This prevents use of the cardwithout signature authentication or following a failed authenticationattempt, in the event the merchant chooses to ignore the failedauthentication message displayed on the display unit 209.

As used herein, the processor 218 may include a chip or logic processorconfigured to acquire, store, verify, analyze and authenticate uniqueuser input signature information. It is understood by those known in theart that instructions for authentication methods and device embodimentsmay be stored on a non-volatile programmable memory and executed by aprocessor 218. Non-volatile programmable memory is configured to be anapplication memory device, and may store information such as the primaryaccount number, current balance information, and/or user's signatureprofiles. The non-volatile programmable memory can be provided on theprocessor 218 itself or alternatively provided as a separate memorydevice coupled to the processor 218. Some examples of a separate memorydevice include, but not limited to: a programmable read only memory(PROM), flash memory, Electrically Erasable Programmable Read-OnlyMemory (EEPROM), or any other non-volatile computer memory or storageknown in the art.

The card 100 can also have a contactless radio frequency unit 216,either in combination with the magnetic strip 200 as part of the card'scommunication element or as the only communication element. Thecontactless radio frequency unit 216 would be activated and deactivatedby the processor 218 to allow use of the card 100 only when the inputsignature information of the card bearer has been authenticated againstthe authorized card holder's signature profile. An example of thecontactless radio frequency unit 216 is the payWave system used by somemerchants.

The processor 218 may also be configured to permanently lock thecommunication element 200 (such as the active magnetic strip or thecontactless radio frequency unit) when a predetermined number ofunsuccessful attempts are made to authenticate the card bearer'ssignature.

FIG. 5 is a schematic illustration of an example of the structure of thesignature input panel 210. A person can write her signature on thesurface of the signature input panel 210 using a stylus similar to theway a signature is written on signature pads found on many conventionalpoint-of-sale payment devices. In some embodiments, the signature inputpanel 210 captures a digitized image of the person's signature andcreates a 2-dimensional digitized image of the signature. In otherembodiments, the signature input panel 210 of the present disclosurecaptures 4-dimensional characteristic parameters on the signaturewritten thereon: pressure, speed, x and y coordinates (i.e. the shape ofthe signature).

As shown in FIG. 5, in one embodiment, the signature input panel 210 iscomprised of a pressure-sensitive matrix 300 that comprises a laminatedmatrix having a plurality of sensing layers. In the illustrated example,four sensing layers 301, 302, 303 and 304 are shown. The signature inputpanel 210 captures the digitized image of the signature written on thesurface layer 301 by registering the X and Y coordinates of the pointson the signature. In some embodiments, the plurality of sensing layers301, 302, 303, 304 allows sensing the changes in the pressure exerted bythe writer throughout the signature. Each of the sensing layers is a2-dimensional matrix of contact points that are activated when thecontact points come in contact with the neighboring sensing layer. Whenpressure is exerted on the top surface sensing layer 301 and cause oneor more pairs of the sensing layers to come in contact with one another,that contacting point is registered as an activated pixel on thesignature input panel 210. The processor 218 coupled to the signatureinput panel 210 captures this data.

Thus, when the user writes her signature on the signature input panel210 using a writing instrument 350, the pressure exerted by the writinginstrument 350 causes one or more pairs of the plurality of sensinglayers 301, 302, 303 and 304 to contact one another and the signatureinput panel 210 registers and captures the signature.

In some embodiments, the signature input panel 210 is also configured todetect and register changes or variations in the pressure exerted by thewriting instrument 350. In FIG. 5, the location A represents a locationwhere the writing instrument 350 is exerting less pressure on thesignature input panel 210 than at the location B. The contact areasbetween each successive pair of the sensing layers underneath thewriting instrument 350 are schematically illustrated by the circles A,B, and C beneath location A and the circles AA, BB, and CC beneathlocation B.

At location A, the contact areas represented by the size of the circlesA, B and C are successively smaller further away from the top layer 301.This is because the pressure exerted by the writing instrument 350 atlocation A is not great enough to reach the bottom layer 304. The sizeof the contact areas A, B and C is measured by the number of activatedpixel points between each pair of the sensing layers. For example,because the contact area A is larger than the contact area B, therewould be more activated pixel points between the sensing layers 301 and302 than between the sensing layers 302 and 303.

At location B, the contact areas represented by the size of the circlesAA, BB and CC are more uniform compared to location A. This is becausewhen the pressure exerted by the writing instrument 350 is greater, moreof the pressure is transferred deeper into the plurality of sensinglayers, Thus, by monitoring the uniformity of the number of activatedpoints between each successive pair of the sensing layers 301, 302, 303and 304, the signature input panel 210 can measure the changes in thepressure exerted by the user as she writes her signature on thesignature input panel 210. Because the part of the uniquecharacteristics of the way a person writes her signature includes thevariations in the pressure exerted with the writing instrument, thepressure variation information can be used in combination with the shapeof the signature by the processor 218 to authenticate the signatureinputted by a card bearer.

The payment processing device 100 can also be configured to measure thevariations in the writer's speed at which the signature is written. Inone embodiment, the processor 218 can use its clock function to measurethe velocity of the writing instrument 350 as the user is writing hersignature. Because one of the unique characteristics of the way a personwrites her signature includes the variations in the speed, the speedvariation information can also be used in combination with the shape ofthe signature, or in combination with the shape of the signature and thepressure variation, to authenticate the signature inputted by a cardbearer.

Thus, the payment processing device 100 captures 4-dimensionalcharacteristic parameters: pressure, speed, x and y coordinates (i.e.the shape of the signature), on the signature being written on thesignature input panel 210. The processor 218 temporarily stores thisinput signature information and compares the information to a pre-storedcard owner's signature profile. The card owner's signature profilecomprises a set of 4-dimensional characteristic parameters: pressure,speed, x and y coordinates, representing the card owner's signature andis stored in the payment processing device 100.

Thus, the signature data comparison is performed by the processor 218using an algorithm that compares the 4-dimensional characteristicparameters of the input signature information to the 4-dimensionalcharacteristic parameters of the pre-stored authorized card owner'ssignature profile. Because of slight variations in the 4-dimensionalcharacteristic parameters that would exist in human written signatures,the comparison algorithm allows for these variances. In other words,because certain amount of variations will exist between two signatureswritten by one person, the signature data comparison algorithm may beconfigured to expect certain amount of variations in the 4-dimensionalcharacteristic parameters.

Referring to FIG. 6, an exemplary method is illustrated in a flow chart400. A payment processing device 100 (e.g. a credit card) having apre-stored digital representation of the authorized card holder'ssignature is provided by an issuing financial institution (see block402). At the point-of-sale location, the user card bearer provides theinput signature information by writing her signature in the signatureinput panel 210 of the card 100 (see block 404). Next, the processor 218of the card 100 authenticates the card bearer's signature by comparingthe input signature information to the pre-stored authorized cardowner's signature profile (see block 406). If the card bearer'ssignature is successfully authenticated, the processor 218 displays amessage on the display unit 209 indicating the positive authenticationresult (see block 414). This message tells the merchant that the cardbearer's signature matches the representation of the card owner'ssignature stored in the card, and that the financial transaction can besafely processed using the card 100 (see block 416). If the cardbearer's signature fails to be authenticated, the processor 218 displaysthe negative authentication result on the display unit 209 (see block410). Next, the card bearer can attempt to authenticate the signatureagain (see block 404).

Referring to FIG. 7, another example of a method is illustrated in aflow chart 500. A payment processing device 100 (e.g. a credit card)having a pre-stored digital representation of the authorized cardholder's signature is provided by an issuing financial institution (seeblock 502). At the point-of-sale location, the user card bearer providesthe input signature information by writing her signature on thesignature input panel 210 of the card 100 (see block 504). Next, theprocessor 218 of the card 100 authenticates the card bearer's signatureby comparing the input signature information to the pre-storedauthorized card owner's signature profile (see block 506). If the cardbearer's signature is successfully authenticated, the processor 218displays a message on the display unit 209 indicating the positiveauthentication result (see block 514). In this example, thecommunication element 200 of the card 100 is an active type such as theactive magnetic strip and/or the contactless radio frequency unitdiscussed above and the processor 218 activates the communicationelement 200 next (see block 515). The merchant can then process thefinancial transaction (see block 516). If the card bearer's signaturefails to be authenticated, the processor 218 displays the negativeauthentication result on the display unit 209 (see block 510). Thecommunication element remains in its default inactive state (see block511). Next, the processor 218 determines whether a pre-determinedthreshold for the allowable number of unsuccessful signatureauthentication attempts has been reached (see block 512). If thethreshold has been reached, the processor 218 can be configured topermanently deactivate the communication element of the card 100 (seeblock 518).

According to an aspect of the disclosure, an additional security measuremay be incorporated where the card issuing entity may have a master lockcombination that may be input into a permanently disabled card 100 toreset the card and allow further attempts at signature activation. Theresetting feature minimizes the amount of replacement cards that wouldbe necessary if permanent deactivation occurs. Such resetting servicecan be provided by the issuing institution at their local branches forthe card owner's convenience. If the threshold has not been reached, thecard bearer can attempt to authenticate the signature again (see block504). For example, the threshold may be set to three consecutiveunsuccessful authentication attempts.

The authorized card owner's pre-stored signature profile information maybe stored in the card's non-volatile memory by a number of ways. In oneexample, the signature profile information is established and storedinto the card 100 by the authorized owner of the card 100 during theinitial receipt and activation of the card. After the card ownerreceives the card 100 from the issuing entity, the card owner may berequested to call the issuing entity to activate the account associatedwith the card. Then, when the card owner inputs her signature into thesignature input panel 210, the 4-dimensional characteristic informationabout the signature, discussed above and referred to as the “signatureprofile information”, is stored in the card's memory by the processor218. During the card activation process, the card holder can be requiredto enter her signature multiple times to allow the processor 218 toestablish average values for the characteristic information that willform the “signature profile information.”

According to another example, the authorized card owner may be requiredto appear at a designated branch location of the card issuing entitywhere the authorized card owner's signature data can be collected by theissuing entity on a standalone device similar to the signature inputpanel 210 that is dedicated to collecting signature profile information.The issuing entity can then store or download the signature profileinformation into the memory of the card 100 being issued to theauthorized card owner.

As used herein, payment processor device embodiments of the presentinvention may include, for example, payment cards, contact cards, creditcards, debit cards, stored value cards, pre-paid cards, and contactlesscards. As used herein, a payment processor card device may be broadlyunderstood as being a portable payment processing device associated withan account within a payment system. The account may be a credit account,a debit account, a stored value account such as, for example, a pre-paidaccount, an account accessible with a gift card, an account accessiblewith a reloadable card. Suitable payment card embodiments may include acard or other payment devices with a solid support, such as for example,plastic support such as PVC and ABS plastic. The card may containimprinted features and/or a hologram to avoid counterfeiting.

As used herein, signature verification applications may be used alone orintegrated with other technologies such as smart cards, encryption keysand biometric verification, to enhance security.

Although examples described above include a display for outputting theresult of the authentication, other output devices may be used. In somealternative embodiments, Card 100 has a pair of light emitting diodes(LEDs, not shown). In one example, an LED having a first color (e.g.,green) indicates successful authentication, and an LED having a secondcolor (e.g., red) indicates a failed authentication attempt. In otheralternative embodiments, card 100 contains one or more embedded soundemitting devices. In one embodiment, one sound emitting device emits acontinuous tone to indicate successful authentication, and two soundemitting devices emit alternating tones of different pitches to indicatea failed authentication attempt.

Although the invention has been described in terms of examples, it isnot limited thereto. Rather, the appended claims should be construedbroadly, to include other variants and embodiments of the invention,which may be made by those skilled in the art without departing from thescope and range of equivalents of the invention.

One or more features from any embodiment may be combined with one ormore features of any other embodiment without departing from the scopeof the invention. A recitation of “a”, “an” or “the” in the abovedescription is intended to mean “one or more” unless specificallyindicated to the contrary. It will be further understood that the terms“comprises,” “comprising,” “includes” and/or “including” when used inthis specification, specify the presence of stated features, steps,operations, elements, and/or components, but do not preclude thepresence or addition of one or more other features, steps, operations,elements, components, and/or groups thereof.

What is claimed is:
 1. A method of authenticating a user of a cardduring a financial transaction, comprising: capturing user inputsignature information comprising changes in 4-dimensional characteristicparameters of the user's signature on a signature input panel providedin the card, wherein the signature input panel comprises a plurality ofsensing layers and is configured to measure changes in pressure whenpressure is exerted on the signature input panel by monitoring a numberof activated pixel points between successive pair of the sensing layers;comparing the user input signature information to a pre-stored signatureprofile; and outputting results of the comparing of the user inputsignature information from an output device provided in the card.
 2. Themethod of claim 1, wherein the pre-stored signature profile comprises4-dimensional characteristic parameters of a reference signature.
 3. Themethod of claim 2, wherein the card is configured to recognize pressure,speed and X and Y coordinates of the user's signature.
 4. The method ofclaim 1, further comprising: activating a communication element providedin the card when the user input signature information matches thepre-stored signature profile; and maintaining a deactivated status forthe communication element when the user input signature information doesnot match the pre-stored signature profile.
 5. The method of claim 4,wherein the communication element is an active magnetic strip.
 6. Themethod of claim 1, further comprising: deactivating, by the card, allfunctions of the card after a predetermined number of consecutiveunsuccessful comparison of the user input signature information to thepre-stored signature profile.
 7. A method for authenticating a user of acard during a financial transaction, comprising: capturing a user inputsignature information comprising changes in 4-dimensional characteristicparameters of the user's signature on a signature input panel providedin the card, wherein the signature input panel comprises a plurality ofsensing layers and is configured to measure changes in pressure whenpressure is exerted on the signature input panel by monitoring a numberof activated pixel points between successive pair of the sensing layers;authenticating the user input signature information; outputting anindication of results of the authentication; activating a communicationelement provided in the card when the user input signature informationis successfully authenticated; and maintaining a deactivated status forthe communication element when the user input signature information isnot authenticated.
 8. The method of claim 7, wherein authenticating theuser input signature information comprises comparing the user inputsignature information against a pre-stored signature profile.
 9. Themethod of claim 8, wherein the pre-stored signature profile comprises4-dimensional characteristic parameters of a reference signature. 10.The method of claim 7, further comprising: deactivating, by the card,all functions of the card after a predetermined number of consecutiveunsuccessful attempts to authenticate the user input signatureinformation.
 11. A non-transitory machine-readable storage medium,encoded with a computer program code, such that, when the computerprogram code is executed by a processor, the processor performs a methodfor authenticating a user of a card during a financial transactioncomprising: capturing a user input signature information comprisingchanges in 4-dimensional characteristic parameters of the user'ssignature on a signature input panel provided in the card, wherein thesignature input panel comprises a plurality of sensing layers and isconfigured to measure changes in pressure when pressure is exerted onthe signature input panel by monitoring a number of activated pixelpoints between successive pair of the sensing layers; comparing the userinput signature information to a pre-stored signature profile; andoutputting results of the comparing of the user input signatureinformation from an output device provided in the card.
 12. Thenon-transitory machine-readable storage medium of claim 11, wherein thepre-stored signature profile comprises 4-dimensional characteristicparameters of a reference signature.
 13. The non-transitorymachine-readable storage medium of claim 12, wherein the card isconfigured to recognize pressure, speed and X and Y coordinates of theuser input signature.
 14. The non-transitory machine-readable storagemedium of claim 11, wherein the method further comprises: activating acommunication element provided in the card when the user input signatureinformation matches the pre-stored signature profile; and maintaining adeactivated status for the communication element when the user inputsignature information does not match the pre-stored signature profile.15. The non-transitory machine-readable storage medium of claim 14,wherein the communication element is an active magnetic strip.
 16. Thenon-transitory machine-readable storage medium of claim 11, wherein themethod further comprises: deactivating, by the card, all functions ofthe card after a predetermined number of consecutive unsuccessfulcomparison of the user input signature information to the pre-storedsignature profile.