Search

US-12627659-B1 - Biometric identification for resource access distribution

US12627659B1US 12627659 B1US12627659 B1US 12627659B1US-12627659-B1

Abstract

Resource access distribution can be managed by biometric identification. For example, a system can receive a request from a device indicating an identity of a user and an intention of the user to access a resource of a computing system. The system can determine biometric data associated with an individual within a predetermined distance from the terminal. The system can decompose the biometric data into biometric sub attributes associated with the individual and retrieve stored sub attributes associated with the identity of the user. The system can determine a confidence score that the individual is the user by comparing the biometric sub attributes associated with the individual to the stored sub attributes. The system can perform an action that including one of (i) preventing the individual from accessing the resource or (ii) allowing the individual to access the resource.

Inventors

  • Timothy Gorman
  • Jason W. Black

Assignees

  • THE HUNTINGTON NATIONAL BANK

Dates

Publication Date
20260512
Application Date
20250306

Claims (17)

  1. 1 . A system comprising: a processor; and a memory communicatively coupled to the processor, the memory including instructions executable by the processor for causing the processor to perform operations comprising: receiving a first request from a device to access a first profile associated with a user, the first profile being a first type of profile associated with resource distribution for the user, the first request including first biometric data of the user; receiving a second request to access a second profile, the second request including second biometric data of the user, the second profile being a second type of profile associated with resource distribution that is different from the first type of profile; determining a match between the first biometric data and the second biometric data; determining, based on the match, that the user is associated with the first profile and the second profile; determining, based on the match and the second request, that the user accessed the second profile associated with the user; in response to determining that the user accessed the second profile of the user and that the user is associated with the first profile and the second profile, merging the first profile with the second profile into a third profile associated with the user by storing the first profile and the second profile under the third profile; and removing the first profile and the second profile in response to merging the first profile and the second profile into the third profile.
  2. 2 . The system of claim 1 , wherein the operations further comprise: outputting a notification to the device requesting an approval to merge the first profile with the second profile in response to determining that the user accessed the second profile of the user; receiving the approval from the device; and in response to receiving the approval, merging the first profile with the second profile.
  3. 3 . The system of claim 1 , wherein the operation of merging the first profile of the user with the second profile of the user comprises: determining a newer profile and an older profile of the first profile and the second profile by comparing a first time that the first profile was last updated and a second time that the second profile was last updated; associating at least one account associated with the older profile with the newer profile; and deactivating the older profile.
  4. 4 . The system of claim 1 , wherein the first profile includes a first attribute of the user and the first biometric data of the user, and the second profile includes a second attribute of the user and the second biometric data of the user, and wherein the operations further comprise: determining that the first attribute of the first profile is different from the second attribute of the second profile; determining that the first biometric data matches the second biometric data; and merging the first profile and the second profile in response to determining that the first biometric data matches the second biometric data.
  5. 5 . The system of claim 1 , wherein the operations further comprise: subsequent to receiving the first request, determining, based on captured sensor data, a plurality of sets of biometric data, each set of biometric data being associated with an individual of a plurality of individuals; determining, based on the first biometric data, a confidence score that the individual is the user by comparing, using a machine learning model, a plurality of biometric sub attributes associated with the individual to a plurality of stored sub attributes associated with the user; and performing an action that includes one of (i) preventing the user from accessing the first profile in response to determining the confidence score is below a pre-set threshold or (ii) allowing the user to access the first profile in response to determining the confidence score is above the pre-set threshold.
  6. 6 . The system of claim 1 , wherein the first request is received via an application executing on the device, wherein the application is associated with a resource distribution computing system, and wherein the application is configured to capture the first biometric data in association with the first request using at least one sensor of the device.
  7. 7 . A method comprising: receiving a first request from a device to access a first profile associated with a user, the first profile being a first type of profile associated with resource distribution for the user, the first request including first biometric data of the user; receiving a second request to access a second profile, the second request including second biometric data of the user, the second profile being a second type of profile associated with resource distribution that is different from the first type of profile; determining a match between the first biometric data and the second biometric data; determining, based on the match, that the user is associated with the first profile and the second profile; determining, based on the match and the second request, that the user accessed the second profile associated with the user; in response to determining that the user accessed the second profile of the user and that the user is associated with the first profile and the second profile, merging the first profile with the second profile into a third profile associated with the user by storing the first profile and the second profile under the third profile; and removing the first profile and the second profile in response to merging the first profile and the second profile into the third profile.
  8. 8 . The method of claim 7 , further comprising: outputting a notification to the device requesting an approval to merge the first profile with the second profile in response to determining that the user accessed the second profile of the user; receiving the approval from the device; and in response to receiving the approval, merging the first profile with the second profile.
  9. 9 . The method of claim 7 , wherein merging the first profile of the user with the second profile of the user comprises: determining a newer profile and an older profile of the first profile and the second profile by comparing a first time that the first profile was last updated and a second time that the second profile was last updated; associating at least one account associated with the older profile with the newer profile; and deactivating the older profile.
  10. 10 . The method of claim 7 , wherein the first profile includes a first attribute of the user and the first biometric data of the user, and the second profile includes a second attribute of the user and the second biometric data of the user, and wherein the method further comprises: determining that the first attribute of the first profile is different from the second attribute of the second profile; determining that the first biometric data matches the second biometric data; and merging the first profile and the second profile in response to determining that the first biometric data matches the second biometric data.
  11. 11 . The method of claim 7 , further comprising: subsequent to receiving the first request, determining, based on captured sensor data, a plurality of sets of biometric data, each set of biometric data being associated with an individual of a plurality of individuals; determining, based on the first biometric data, a confidence score that the individual is the user by comparing, using a machine learning model, a plurality of biometric sub attributes associated with the individual to a plurality of stored sub attributes associated with the user; and performing an action that includes one of (i) preventing the user from accessing the first profile in response to determining the confidence score is below a pre-set threshold or (ii) allowing the user to access the first profile in response to determining the confidence score is above the pre-set threshold.
  12. 12 . The method of claim 7 , wherein the first request is received via an application executing on the device, wherein the application is associated with a resource distribution computing system, and wherein the application is configured to capture the first biometric data in association with the first request using at least one sensor of the device.
  13. 13 . A non-transitory computer-readable medium comprising instructions that are executable by a processor for causing the processor to perform operations comprising: receiving a first request from a device to access a first profile associated with a user, the first profile being a first type of profile associated with resource distribution for the user, the first request including first biometric data of the user; receiving a second request to access a second profile, the second request including second biometric data of the user, the second profile being a second type of profile associated with resource distribution that is different from the first type of profile; determining a match between the first biometric data and the second biometric data; determining, based on the match, that the user is associated with the first profile and the second profile; determining, based on the match and the second request, that the user accessed the second profile associated with the user; in response to determining that the user accessed the second profile of the user and that the user is associated with the first profile and the second profile, merging the first profile with the second profile into a third profile associated with the user by storing the first profile and the second profile under the third profile; and removing the first profile and the second profile in response to merging the first profile and the second profile into the third profile.
  14. 14 . The non-transitory computer-readable medium of claim 13 , wherein the operations further comprise: outputting a notification to the device requesting an approval to merge the first profile with the second profile in response to determining that the user accessed the second profile of the user; receiving the approval from the device; and in response to receiving the approval, merging the first profile with the second profile.
  15. 15 . The non-transitory computer-readable medium of claim 13 , wherein the operation of merging the first profile of the user with the second profile of the user comprises: determining a newer profile and an older profile of the first profile and the second profile by comparing a first time that the first profile was last updated and a second time that the second profile was last updated; associating at least one account associated with the older profile with the newer profile; and deactivating the older profile.
  16. 16 . The non-transitory computer-readable medium of claim 13 , wherein the first profile includes a first attribute of the user and the first biometric data of the user, and the second profile includes a second attribute of the user and the second biometric data of the user, and wherein the operations further comprise: determining that the first attribute of the first profile is different from the second attribute of the second profile; determining that the first biometric data matches the second biometric data; and merging the first profile and the second profile in response to determining that the first biometric data matches the second biometric data.
  17. 17 . The non-transitory computer-readable medium of claim 13 , wherein the operations further comprise: subsequent to receiving the first request, determining, based on captured sensor data, a plurality of sets of biometric data, each set of biometric data being associated with an individual of a plurality of individuals; determining, based on the first biometric data, a confidence score that the individual is the user by comparing, using a machine learning model, a plurality of biometric sub attributes associated with the individual to a plurality of stored sub attributes associated with the user; and performing an action that includes one of (i) preventing the user from accessing the first profile in response to determining the confidence score is below a pre-set threshold or (ii) allowing the user to access the first profile in response to determining the confidence score is above the pre-set threshold.

Description

CROSS-REFERENCE TO RELATED APPLICATION This is a continuation of U.S. patent application Ser. No. 19/071,988, filed Mar. 6, 2025, and titled “BIOMETRIC IDENTIFICATION FOR RESOURCE ACCESS DISTRIBUTION,” the entirety of which is incorporated herein by reference. TECHNICAL FIELD The disclosure is generally directed to secure access to a resource distribution system. Specifically, the disclosure is directed to techniques for improving the speed, security, and efficiency of resource distribution system based on biometric identification. BACKGROUND Resource distribution systems often manage sensitive resources that may only be distributed by specific users. Resources may be stored in an account, and users may have profiles that include which accounts the user is allowed to access. A typical transaction in a resource distribution system involves receiving a request from a user to access resources, authenticating the identity of the user as a user authorized to access the resources, and allowing the user to access the resources in response to a positive identification. Authenticating the identity of a user may be done using passwords, photo identification, and more recently biometric identification. In biometric identification, user features, biometric identifier's, are analyzed to authenticate the identity of the user. Drawbacks of traditional resource distribution systems employing biometric identification include slow authentication, inaccurate biometric identification, and burdensome storage requirements. SUMMARY In some embodiments, a system can include a processor and a memory communicatively coupled to the processor. The memory can include instructions executable by the processor for causing the processor to perform operations. The operations can involve receiving a request from a device indicating an identity of a user and an intention of the user to access at least one resource of a computing system at a terminal of the computing system, and determining, based on captured sensor data, a plurality of sets of biometric data. Each set of biometric data can be associated with an individual of a plurality of individuals within a first predetermined distance from the terminal. The operations can also involve decomposing at least one of the plurality of sets of biometric data into a plurality of biometric sub attributes associated with the individual, retrieving a plurality of stored sub attributes associated with the identity of the user, and determining a confidence score that the individual is the user by comparing, using a machine learning model, the plurality of biometric sub attributes associated with the individual to the plurality of stored sub attributes associated with the identity. The operations can also involve performing an action that includes one of (i) preventing the individual from accessing the at least one resource in response to determining the confidence score is below a pre-set threshold or (ii) allowing the individual to access the at least one resource in response to determining the confidence score is above the pre-set threshold. In some embodiments, a method can involve receiving a request from a device indicating an identity of a user and an intention of the user to access at least one resource of a computing system at a terminal of the computing system, and determining, based on captured sensor data, a plurality of sets of biometric data. Each set of biometric data can be associated with an individual of a plurality of individuals within a first predetermined distance from the terminal. The method can also involve decomposing at least one of the plurality of sets of biometric data into a plurality of biometric sub attributes associated with the individual, retrieving a plurality of stored sub attributes associated with the identity of the user, and determining a confidence score that the individual is the user by comparing, using a machine learning model, the plurality of biometric sub attributes associated with the individual to the plurality of stored sub attributes associated with the identity. The method can also involve performing an action that includes one of (i) preventing the individual from accessing the at least one resource in response to determining the confidence score is below a pre-set threshold or (ii) allowing the individual to access the at least one resource in response to determining the confidence score is above the pre-set threshold. In some embodiments, a non-transitory computer-readable medium can include instructions that are executable by a processor for causing the processor to perform operations. The operations can involve receiving a request from a device indicating an identity of a user and an intention of the user to access at least one resource of a computing system at a terminal of the computing system, and determining, based on captured sensor data, a plurality of sets of biometric data. Each set of biometric data can be associated with an individual