The signature template is saved on a database, where the system can access through validation or identification. The database, located on PC or server, is managed by MySQL Database Management System.

Collected and saved data cannot be employed to "reconstruct" the pen's original behaviour, nor can they be used as computer input to deceive the system.
The authentication algorithm is only used to verify the behavioural statistical similarity, as the second input is compared to the original model.
If data is corrupted, or even "unlawfully replaced", the algorithm recognizes the tampering and originates an authentication error.

If a stolen signature template is returned to the algorithm ("skimming"), the authentication is denied as it does not meet both codifications generated by the firmware (uniqueness and time-stamp).
System security is not based on database protection.