US 12,407,684 B2
System and method for implementing authentication control protocols via components of an entity device
Christopher Daniel Birch, Tega Cay, SC (US); Sophie Morgan Danielpour, Durham, NC (US); Susan R. Hart, Addison, TX (US); Son Huynh, Charlotte, NC (US); Tyler Keith Prothro, Waxahachie, TX (US); Shannon Sabina Rolinger, Pineville, NC (US); Amado Jose Martinez Suarez, Addison, TX (US); and Stephen Jack Williams, Charlotte, NC (US)
Assigned to BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed by BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed on Nov. 10, 2022, as Appl. No. 17/984,919.
Prior Publication US 2024/0163283 A1, May 16, 2024
Int. Cl. H04L 9/40 (2022.01); G06V 40/16 (2022.01)
CPC H04L 63/0861 (2013.01) [G06V 40/161 (2022.01); G06V 40/168 (2022.01)] 20 Claims
OG exemplary drawing
 
1. A system for implementing authentication control protocols via components of entity device, the system comprising:
a memory device with computer-readable program code stored thereon;
a communication device; and
a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to:
determine initiation of a resource interaction by a user at an entity device;
control one or more components of the entity device to cause the entity device to capture a real-time image of the user;
retrieve a user image provided by the user a previous time period during processing of one or more resource pools associated with the user;
generate an updated enhanced user image reflecting current appearance of the user for a current time period based on the user image provided at the previous time period, wherein the current time period is a time period associated with the initiation of the resource interaction by the user;
compare the real-time image captured via the entity device with the updated enhanced user image of the user generated for the current time period;
in response to comparing the real-time image with the updated enhanced user image, determine if the real-time image matches the updated enhanced user image; and
implement one or more authentication control protocols based on determining if the real-time image matches the updated enhanced user image.