| CPC H04L 63/0861 (2013.01) [G06V 40/10 (2022.01); G06V 40/1365 (2022.01); G06V 40/197 (2022.01); G06V 40/58 (2022.01)] | 20 Claims |

|
1. A system comprising:
a plurality of biometric sensors, wherein each biometric sensor from among the plurality of biometric sensors is configured to capture sensor data that indicates one or more physical characteristics associated with applicants, wherein the plurality of biometric sensors comprises at least one of a fingerprint scanner or an eye scanner;
a biometric database configured to store a first data corresponding to a first account holder, the first data comprising:
a first encrypted biometric data obtained from the first account holder at a first location associated with a first institution, wherein the first encrypted biometric data is generated using a particular hashing algorithm, wherein the particular hashing algorithm comprises a fuzzy hashing algorithm that when executed by a processor, causes the processor to generate a fuzzy hash value that remains consistent despite a certain degree of variation in biometric data associated with a same applicant, wherein the first encrypted biometric data represented a first set of features extracted from the sensor data by a machine learning algorithm, wherein the first set of features comprises at least one of a fingerprint feature or an iris feature; and
a first encrypted identification information provided by the first account holder at the first location, wherein the first encrypted identification information is different from the first encrypted biometric data, and was used to open an existing account at the first location; and
a distributed network of institutions comprising the first institution and a second institution, wherein:
the distributed network of institutions is formed to verify identities of applicants for opening new accounts at any member of the distributed network of institutions based at least in part upon data obtained from at least another member of the distributed network of institutions;
each member of the distributed network of institutions comprises a device configured to facilitate communications of a respective institution;
the distributed network of institutions is formed in response to establishing a network communication path between a first device associated with the first institution, a second device associated with the second institution, and the biometric database;
each member of the distributed network of institutions is communicatively coupled with other members of the distributed network of institutions;
the biometric database is created by the distributed network of institutions and operably coupled to the distributed network of institutions; and
each member of the distributed network of institutions shares biometric data and identification information obtained from applicants and account holders with the other members of the distributed network of institutions by storing the obtained biometric data and identification information in the biometric database, such that the first data is received by the first device; and the first data is encrypted using the particular hashing algorithm and stored in the biometric database;
a hardware processor communicatively coupled to the biometric database, the hardware processor being associated with the first device, and configured to:
derive the first encrypted biometric data from the first set of features;
generate, via the fuzzy hashing algorithm, a first fuzzy hash value based at least in part upon the first encrypted biometric data;
receive, from the second device over a network, a second data corresponding to a first applicant, the second data comprising:
a second biometric data obtained from the first applicant at a second location associated with the second institution that is different from the first institution; and
a second identification information provided by the first applicant at the second location, wherein the first applicant is requesting to open a new account using the second identification information that is different from the second biometric data at the second location; and
in response to receiving the second data corresponding to the first applicant:
determine that the first applicant is the first account holder based at least in part upon:
fetching the first encrypted biometric data from the biometric database using the established communication path;
encrypting the second biometric data by feeding the second biometric data to the particular hashing algorithm;
generating, via the fuzzy hashing algorithm, a second fuzzy hash value based at least in part upon the second encrypted biometric data;
comparing the first encrypted biometric data to the second encrypted biometric data; and
determining that the second encrypted biometric data obtained from the first applicant is within a certain degree of variation from the first encrypted biometric data obtained from the first account holder and stored in the biometric database;
comparing the first fuzzy hash value and the second fuzzy hash value; and
determining that the first fuzzy hash value corresponds to the second fuzzy hash value despite the determined certain degree of variation between the first encrypted biometric data and the second encrypted biometric data;
determine that the first applicant is attempting to open the new account using a fake identity based at least in part determining that the second encrypted identification information provided by the first applicant does not match the first encrypted identification information provided by the first account holder and stored in the biometric database; and
in response to determining that the second encrypted biometric data obtained from the first applicant is within the certain degree of variation from the first encrypted biometric data obtained from the first account holder, determining that the first fuzzy hash value corresponds to the second fuzzy hash value despite the determined certain degree of variation between the first encrypted biometric data and the second encrypted biometric data, and that the second encrypted identification information provided by the first applicant does not match the first encrypted identification information provided by the first account holder:
transmit an alert to the second device over the network, the alert indicating that an identity of the first applicant could not be verified; and
decline opening the new account for the first applicant at the second location.
|