Enhanced Biometric Data and Systems for Processing Events Using Enhanced Biometric Data

ABSTRACT

Systems for generating enhanced biometric data and using enhanced biometric data to process events are provided. A system may receive a request for enhanced biometric data from a first user and may extract details associated with the request. Based on the identity of the first user and the extracted details, a user profile may be selected from a plurality of user profiles associated with the first user. The user profile may include biometric data of the first user, predetermined limits on types of events to be processed, amounts, and the like. The system may generate enhanced biometric data based on the user profile and may transmit the enhanced biometric data to a computing device of a second user. The second user may then provide the enhanced biometric data when requesting to process an event. The system may evaluate the enhanced biometric data to determine whether it matches pre-stored biometric data and whether the event details are within the limits associated with the user profile from which the enhanced biometric data was generated. If so, the event may be processed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to co-pendingU.S. application Ser. No. 15/936,621, filed Mar. 27, 2018, and entitled“Enhanced Biometric Data and Systems for Processing Events UsingEnhanced Biometric Data,” which is incorporated herein by reference inits entirety.

BACKGROUND

Aspects of the disclosure relate to electrical computers, systems, anddevices. In particular, one or more aspects of the disclosure relate togenerating and using enhanced biometric data in processing events.

The use of biometric data in event processing has become much morecommon. Many systems rely on biometric data to authenticate users,authorize processing of an event, such as a transaction, and the like.However, conventional systems rely on static biometric data (e.g.,naturally occurring biometric data). Unfortunately, this data can bereplicated and/or manipulated by unauthorized users to performunauthorized activity. Further, conventional systems rely on thepresence of the user associated with the biometric data to provide thebiometric data. Accordingly, arrangements in which biometric data ismodified to provide improved security and is accessible to authorizedusers other than the user associated with the biometric data may beadvantageous.

SUMMARY

The following presents a simplified summary in order to provide a basicunderstanding of some aspects of the disclosure. The summary is not anextensive overview of the disclosure. It is neither intended to identifykey or critical elements of the disclosure nor to delineate the scope ofthe disclosure. The following summary merely presents some concepts ofthe disclosure in a simplified form as a prelude to the descriptionbelow.

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with using static biometric data to process events.

In some examples, a system, computing platform, or the like, may receivea request for enhanced biometric data from a first user. If the firstuser is not registered to the system, the system may register the firstuser, including collecting biometric data of the first user. Once thefirst user is registered, or if the first user is already registered,details associated with the request may be extracted. For instance, therequest may include additional information associated with the request.

In some arrangements, based on an identity of the first user associatedwith the request and the additional information, a user profile may beselected from a plurality of user profiles associated with the firstuser. The user profile may include biometric data of the first user, aswell as predetermined limits on types of events to be processed,amounts, and the like. The system may then generate enhanced biometricdata based on the user profile and may transmit the enhanced biometricdata to a computing device of a second user, different from the firstuser.

In some examples, the second user may then provide the enhancedbiometric data (e.g., via an enhanced biometric data output) whenrequesting to process an event. The system may evaluate the enhancedbiometric data to determine whether it matches pre-stored biometric dataof the first user and whether the event details are within the limitsassociated with the user profile from which the enhanced biometric datawas generated. If so, the event may be processed.

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIGS. 1A and 1B depict an illustrative computing environment forimplementing enhanced biometric data generation and event processingfunctions in accordance with one or more aspects described herein;

FIGS. 2A-2G depict an illustrative event sequence for implementingenhanced biometric data generation and event processing functions inaccordance with one or more aspects described herein;

FIG. 3 depicts an illustrative method for implementing enhancedbiometric data generation functions in accordance with one or moreaspects described herein;

FIG. 4 depicts another illustrative method for implementing enhancedbiometric data generation functions in accordance with one or moreaspects described herein;

FIG. 5 depicts an illustrative method for implementing event processingfunctions using enhanced biometric data in accordance with one or moreaspects described herein;

FIGS. 6A-6C illustrate examples of biometric data and enhanced biometricdata in accordance with one or more aspects described herein;

FIG. 7 illustrates another example implementation of enhanced biometricdata in accordance with one or more aspects described herein;

FIG. 8 illustrates yet another example implementation of enhancedbiometric data in accordance with one or more aspects described herein;

FIG. 9 illustrates one example operating environment in which variousaspects of the disclosure may be implemented in accordance with one ormore aspects described herein; and

FIG. 10 depicts an illustrative block diagram of workstations andservers that may be used to implement the processes and functions ofcertain aspects of the present disclosure in accordance with one or moreaspects described herein.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

Some aspects of the disclosure relate to generating an using enhancedbiometric data for event processing. The functions discussed herein maybe performed in real-time or near real-time to facilitate secure andefficient event processing.

As discussed above, the use of biometric data in user authentication andevent processing authorization is becoming more common. However,conventional systems rely on naturally occurring biometric data, such asfingerprint, voice print, iris or retinal scan, or the like. This isstatic data that, once obtained by an unauthorized user, can be used tomimic the identity of the authorized user to conduct unauthorizedactivity.

Accordingly, the arrangements described herein provide a flexible,secure alternative to conventional systems that rely on static data. Thearrangements described herein allow for generation of enhanced biometricdata that include some or all of the naturally occurring biometric data,while including additional, machine readable data, that can be used tocontrol use of the enhanced biometric data. For instance, a user mayestablish a plurality of user profiles. Each user profile of theplurality of user profiles may include different limits or controls toimplement in the use of the enhanced biometric data generated from therespective user profile. For example, a user may have a user profilethat will be valid for a predetermined period of time and may permitonly events up to a predetermined amount to be processed.

Accordingly, a user may request enhanced biometric data and the systemmay generate the enhanced biometric data based on a selected userprofile. Any limits, controls, or the like, may be encoded into theenhanced biometric data such that it can be read when the enhancedbiometric data is provided with an event processing request.

Once the enhanced biometric data is generated, it may be transmitted toa computing device of the requesting user, to a computing device ofanother user, or the like. The computing device may then generate anenhanced biometric data output. The enhanced biometric data output mayinclude a projected image of the enhanced biometric data (e.g.,biometric data of the user and additional machine readable data). Inother examples, the enhanced biometric output may be an adhesive devicethat may be a sticker, temporary tattoo, or the like. The adhesivedevice may adhere to a body part of a user, a mobile device, a wearabledevice, or the like. In some examples, the adhesive device may betransparent or semi-transparent to permit biometric data of a user to beviewed through a portion of the enhanced biometric data output while themachine readable data overlays a portion of the biometric data.

The enhanced biometric data may then be provided during a request forevent processing, such as a transaction request. For instance, a usermay provide the enhanced biometric data via the enhanced biometric dataoutput to authenticate the user, authorize processing of the event, orthe like.

These and various other arrangements will be discussed more fully below.

FIGS. 1A and 1B depict an illustrative computing environment forimplementing and using a system for generating enhanced biometric dataand processing events based on the enhanced biometric data in accordancewith one or more aspects described herein. Referring to FIG. 1A,computing environment 100 may include one or more computing devicesand/or other computing systems. For example, computing environment 100may include an enhanced biometric data generation and event processingcomputing platform 110, a biometric data capture computing device 120, afirst local user computing device 150, a second local user computingdevice 155, a first remote user computing device 170, and a secondremote user computing device 175.

Enhanced biometric data generation and event processing computingplatform 110 may be configured to perform various functions associatedwith generating enhanced biometric data and processing events based onthe enhanced biometric data. In some examples, a user may requestenhanced biometric data. The enhanced biometric data may be used inevent processing functions to improve security, privacy, avoidunauthorized activity, and the like. The enhanced biometric data mayinclude enhanced fingerprint data, enhanced voice print data, enhancediris or retinal data, and the like.

A user may register with the system including providing identifyinginformation, biometric data and the like. In some examples, a pluralityof profiles for the user may be generated. In some arrangements, eachprofile may include different event limits (e.g., amount, type of event,or the like). Accordingly, enhanced biometric data may be generatedincluding the limits associated with a particular profile in order tocontrol events processed using the enhanced biometric data.

After registration, a user may request enhanced biometric data.Accordingly, the enhanced biometric data generation and event processingcomputing platform 110 may generate enhanced biometric data. Theenhanced biometric data may include some or all of a user's actualbiometric data but may temporarily modify some portion of the biometricdata or may temporarily add additional data, such as machine readabledata. Accordingly, the user may be authenticated for event processingfrom the actual biometric data and the temporarily modified or addeddata may be used to control limits on events being processed.

The user may provide the enhanced biometric data to the enhancedbiometric data generation and event processing computing platform 110when requesting processing of an event. The enhanced biometric datageneration and event processing computing platform 110 may then evaluatethe enhanced biometric data to ensure the data matches pre-stored dataand to ensure that event details are within limits associated with theprofile associated with the enhanced biometric data. If so, the eventmay be processed. If not, the event processing request may be rejectedor denied.

Biometric data capture computing device 120 may include one or morecomputing devices configured to capture biometric data during an event(e.g., at a vendor, service provider, or the like). For instance, theuser may request processing of an event and may submit, via thebiometric data capture computing device 120, enhanced biometric data. Insome examples, the biometric data capture computing device 120 may bepart of or associated with a point-of-sale or other system used by avendor, service provider, merchant, or the like, to process events, suchas transactions. The biometric data capture computing device 120 maytransmit the enhanced biometric data to the enhanced biometric datageneration and event processing computing platform 110 for evaluation.

Local user computing device 150, 155 and remote user computing device170, 175 may be configured to communicate with and/or connect to one ormore computing devices or systems shown in FIG. 1A. For instance, localuser computing device 150, 155 may communicate with one or morecomputing systems or devices via network 190, while remote usercomputing device 170, 175 may communicate with one or more computingsystems or devices via network 195. In some examples, local usercomputing device 150, 155 may be used to control or implement aspects ofthe functions performed by enhanced biometric data generation and eventprocessing computing platform 110.

The remote user computing devices 170, 175 may be used to communicatewith, for example, enhanced biometric data generation and eventprocessing computing platform 110, request event processing, requestenhanced biometric data, and the like.

In one or more arrangements, biometric data capture computing device120, local user computing device 150, local user computing device 155,remote user computing device 170, and/or remote user computing device175 may be any type of computing device or combination of devicescapable of performing the particular functions described herein. Forexample, biometric data capture computing device 120, local usercomputing device 150, local user computing device 155, remote usercomputing device 170, and/or remote user computing device 175 may, insome instances, be and/or include server computers, desktop computers,laptop computers, tablet computers, smart phones, or the like that mayinclude one or more processors, memories, communication interfaces,storage devices, and/or other components. As noted above, and asillustrated in greater detail below, any and/or all of biometric datacapture computing device 120, local user computing device 150, localuser computing device 155, remote user computing device 170, and/orremote user computing device 175 may, in some instances, bespecial-purpose computing devices configured to perform specificfunctions.

Computing environment 100 also may include one or more computingplatforms. For example, and as noted above, computing environment 100may include enhanced biometric data generation and event processingcomputing platform 110. As illustrated in greater detail below, enhancedbiometric data generation and event processing computing platform 110may include one or more computing devices configured to perform one ormore of the functions described herein. For example, enhanced biometricdata generation and event processing computing platform 110 may includeone or more computers (e.g., laptop computers, desktop computers,servers, server blades, or the like).

As mentioned above, computing environment 100 also may include one ormore networks, which may interconnect one or more of enhanced biometricdata generation and event processing computing platform 110, biometricdata capture computing device 120, local user computing device 150,local user computing device 155, remote user computing device 170,and/or remote user computing device 175. For example, computingenvironment 100 may include private network 190 and public network 195.Private network 190 and/or public network 195 may include one or moresub-networks (e.g., Local Area Networks (LANs), Wide Area Networks(WANs), or the like). Private network 190 may be associated with aparticular organization (e.g., a corporation, financial institution,educational institution, governmental institution, or the like) and mayinterconnect one or more computing devices associated with theorganization. For example, enhanced biometric data generation and eventprocessing computing platform 110, local user computing device 150, andlocal user computing device 155, may be associated with an organization(e.g., a financial institution), and private network 190 may beassociated with and/or operated by the organization, and may include oneor more networks (e.g., LANs, WANs, virtual private networks (VPNs), orthe like) that interconnect enhanced biometric data generation and eventprocessing computing platform 110, local user computing device 150, andlocal user computing device 155, and one or more other computing devicesand/or computer systems that are used by, operated by, and/or otherwiseassociated with the organization. Public network 195 may connect privatenetwork 190 and/or one or more computing devices connected thereto(e.g., enhanced biometric data generation and event processing computingplatform 110, local user computing device 150, local user computingdevice 155) with one or more networks and/or computing devices that arenot associated with the organization. For example, biometric datacapture computing device 120, remote user computing device 170, and/orremote user computing device 175 might not be associated with anorganization that operates private network 190 (e.g., because biometricdata capture computing device 120, remote user computing device 170 andremote user computing device 175 may be owned, operated, and/or servicedby one or more entities different from the organization that operatesprivate network 190, such as one or more customers of the organization,public or government entities, and/or vendors of the organization,rather than being owned and/or operated by the organization itself or anemployee or affiliate of the organization), and public network 195 mayinclude one or more networks (e.g., the internet) that connect biometricdata capture computing device 120, remote user computing device 170 andremote user computing device 175 to private network 190 and/or one ormore computing devices connected thereto (e.g., enhanced biometric datageneration and event processing computing platform 110, local usercomputing device 150, local user computing device 155).

Referring to FIG. 1B, enhanced biometric data generation and eventprocessing computing platform 110 may include one or more processors111, memory 112, and communication interface 113. A data bus mayinterconnect processor(s) 111, memory 112, and communication interface113. Communication interface 113 may be a network interface configuredto support communication between enhanced biometric data generation andevent processing computing platform 110 and one or more networks (e.g.,private network 190, public network 195, or the like). Memory 112 mayinclude one or more program modules having instructions that whenexecuted by processor(s) 111 cause enhanced biometric data generationand event processing computing platform 110 to perform one or morefunctions described herein and/or one or more databases that may storeand/or otherwise maintain information which may be used by such programmodules and/or processor(s) 111. In some instances, the one or moreprogram modules and/or databases may be stored by and/or maintained indifferent memory units of enhanced biometric data generation and eventprocessing computing platform 110 and/or by different computing devicesthat may form and/or otherwise make up enhanced biometric datageneration and event processing computing platform 110.

For example, memory 112 may have, store, and/or include an enhancedbiometric data request module 112 a. Enhanced biometric data requestmodule 112 a may store instructions and/or data that may cause or enablethe enhanced biometric data generation and event processing computingplatform 110 to receive a request for enhanced biometric data andprocess the request. For instance, a user may request enhanced biometricdata via a remote user computing device 170, 175, which may betransmitted to the enhanced biometric data generation and eventprocessing computing platform 110. The enhanced biometric data requestmodule 112 a may receive the request and generate a request for userinformation and biometric data. The user may provide the requestedinformation, such as name or other identifier, account information,profile information (e.g., limits for different profiles), and the like.In addition, the user may provide biometric data, such as a fingerprint,voice print, iris or retinal scan, or the like. In some examples, thebiometric data may be collected via the remote user computing device170, 175 which may, in some examples, be a mobile computing device ofthe user, such as a smartphone, tablet, or the like. The enhancedbiometric data request module 112 a may then register the user andcreate and/or store one or more profiles (e.g., including userinformation, limits, biometric data, and the like) associated with theuser. The profiles may include a plurality of profiles having differentevent limits, event type controls, and the like. In some examples, theplurality of profiles may be stored in a database, such as profiledatabase 112 f.

Additionally or alternatively, the enhanced biometric data requestmodule 112 a may store instructions and/or data that may cause or enablethe enhanced biometric data generation and event processing computingplatform 110 to receive a request for enhanced biometric data andprocess the request. For instance, the enhanced biometric data requestmodule 112 a may receive a request for enhanced biometric data from, forexample, remote user computing device 170, 175. The enhanced biometricdata request module 112 a may then process the request. For instance,the enhanced biometric data request module 112 a may identify a userassociated with the request, an account associated with the user, asecond user to whom the enhanced biometric data should be transmitted,or the like.

The enhanced biometric data generation and event processing computingplatform 110 may further have, store and/or include a profile selectionmodule 112 b. The profile selection module 112 b may store instructionsand/or data that may cause or enable the enhanced biometric datageneration and event processing computing platform 110 to select a userprofile from a plurality of user profiles (e.g., plurality of userprofiles for each user) for association with the requested enhancedbiometric data. In some examples, a request for enhanced biometric datamay include identification of a profile for use. In other examples, therequest for enhanced biometric data may include details associated witha time period for which the enhanced biometric data should be active,amount limits for events to be processed, types of events to beprocessed, and the like. The profile selection module 112 b may receivethis information and may automatically select an appropriate profile foruse based on the data. The appropriate profile may then be selected andretrieved from the profile database 112 f.

The enhanced biometric data generation and event processing computingplatform 110 may further have, store and/or include enhanced biometricdata generation module 112 c. Enhanced biometric data generation module112 c may store instructions and/or data that may cause or enable theenhanced biometric data generation and event processing computingplatform 110 to generate enhanced biometric data. For instance, theenhanced biometric data generation module 112 c may retrieve biometricdata provided by the user and data associated with a selected profileand, using the biometric data and profile data, may generate enhancedbiometric data. In some examples, the enhanced biometric data mayinclude a sufficient portion of the biometric data to permit the systemto identify and/or authenticate a user when an event is requested.Further, the enhanced biometric data may include encoded datacontrolling an amount, type, or the like, of event that may be processedusing the enhanced biometric data.

In some examples, the enhanced biometric data may include an image thatmay be transmitted to a remote user computing device 170, 175. The imagemay then be projected (e.g., via an application executing on the remoteuser computing device 170, 175) onto a body part of a user. Forinstance, the image may be projected onto a fingertip of a user, or ontoa fingerprint reading device, such as biometric data capture computingdevice 120, for use in processing the event. In some arrangements, theprojected image may include a portion of the fingerprint of the user aswell as temporarily modified data indicating limits, and the like. Inother examples, the projected image may overlay the fingerprint of theuser such that the user's fingerprint, or portion thereof, may bevisible through portions of the overlay and portions may be temporarilymodified by projection data including profile limits, and the like. Inother examples, an entire fingerprint of the user may be visible whileareas around the fingerprint may include the projected image includingthe profile data. In still other examples, the projected image may beconfigured to overlay the user's fingerprint such that fingerprint datais read from the projected image rather than the actual fingerprint ofthe user.

In other examples, the enhanced biometric data may be transmitted to aremote user computing device 170, 175 and may be printed onto anadhesive device, such as a sticker, temporary tattoo, or the like. Theenhanced biometric data (e.g., image of biometric data and other,machine readable data) may be printed and the user may adhere theenhanced biometric data to a body part. Similar to the arrangementsdiscussed above, the adhesive device may be transparent allowing aportion of the user's biometric data, such as a fingerprint, to be readthrough the adhesive device while additional data on the adhesive devicemay include encoded data including event limits, and the like, based onthe user profile. In another example, the adhesive device may be opaqueand may include an image of the user's biometric data, or portionthereof, as well as other temporary data modifying the biometric data toinclude the profile limits or including additional data providing thelimits imposed based on the profile.

In some examples, enhanced biometric data may be used by the userrequesting the event. In other examples, the enhanced biometric data maybe transmitted to another user, such as a child, caretaker, authorizedagent of the user, and the like. In examples in which an adhesive deviceis used, the adhesive device may be configured to adhere to a body partof a user, to a mobile device, wearable device, or the like.

In some arrangements, the enhanced biometric data generation module 112c may control a time period for which the enhanced biometric data may beactivated. For instance, the enhanced biometric data may be generatedfor one time use and, after use, may be deactivated. In another example,the enhanced biometric data may be activated for a predetermined amountof time, date range, or the like. Accordingly, after the predeterminedamount of time has expired, the date range has passed, or the like, theenhanced biometric data may be deactivated.

The enhanced biometric data generation and event processing computingplatform 110 may further have, store and/or include event requestprocessing module 112 d. Event request processing module 112 d may storeinstructions and/or data that may cause or enable the enhanced biometricdata generation and event processing computing platform 110 to receive arequest to process an event from a user, such as from remote usercomputing device 170, 175. The request may include event details, suchas parties involved, amount involved, type of event, and the like. Therequest may further include the enhanced biometric data generated andtransmitted to the user. The event request processing module 112 d mayreceive the data and may process the request. For instance, the eventrequest processing module 112 d may transmit the received enhancedbiometric data to enhanced biometric data evaluation/matching module 112e. The enhanced biometric data evaluation/matching module 112 e maystore instructions and/or data configured to cause or enable theenhanced biometric data generation and event processing computingplatform 110 to compare the enhanced biometric data to biometric dataassociated with the user (e.g., stored during the registration process).As discussed above, the enhanced biometric data may include a sufficientportion of the biometric data of the user to identify/authenticate theuser. Accordingly, the enhanced biometric data evaluation/matchingmodule 112 e may evaluate the enhanced biometric data to determinewhether it matches biometric data of the user. If so, additionalprocessing may occur. If not, the requested event may be denied.

The enhanced biometric data evaluation/matching module 112 e maytransmit a result of the comparison to the event request processingmodule 112 d and, based on the result, the event request processingmodule 112 d may further evaluate the requested event. For instance, theenhanced biometric data may be analyzed or decoded to determine eventlimits (e.g., amount, type, or the like) within the enhanced biometricdata. The event details may then be compared to the event limits todetermine whether the requested event meets the criteria or limitsassociated with the enhanced biometric data. If so, the event may beprocessed. If not, the requested event may be denied.

FIGS. 2A-2G depict an illustrative event sequence for implementing andusing enhanced biometric data generation and event processing functionsin accordance with one or more aspects described herein. The eventsshown in the illustrative event sequence are merely one example sequenceand additional events may be added, or events may be omitted, withoutdeparting from the invention.

Referring to FIG. 2A, at step 201, a request for enhanced biometric datamay be received. For instance, a request for enhanced biometric data maybe received via a remote user computing device 170, 175. In someexamples, the request for enhanced biometric data may be a first requestreceived from a user and requiring registration. In other examples, theuser may already be registered and the request for enhanced biometricdata might not require registration.

At step 202, a connection may be established between the remote usercomputing device 170, 175 and the enhanced biometric data generation andevent processing computing platform 110. For instance, a first wirelessconnection may be established between the remote user computing device170, 175 and the enhanced biometric data generation and event processingcomputing platform 110. While the wireless connection is established,the request for enhanced biometric data may be transmitted to theenhanced biometric data generation and event processing computingplatform 110 at step 203.

At step 204, the request may be received and enhanced biometricfunctions may be initiated and/or activated. For instance, one or morefunctions associated with generating enhanced biometric data may beenabled.

At step 205, if the user is not previously registered (e.g., this is afirst request for enhanced biometric data) a request for registrationinformation may be generated. In some examples, the request may includea request for name, account numbers, profile information, amount limitsper profile, event type limits per profile, biometric data (e.g.,fingerprint, retinal scan, voice print, and the like), and the like.

At step 206, while the first wireless connection is established, therequest for registration information may be transmitted to the remoteuser computing device 170, 175.

With reference to FIG. 2B, at step 207, the registration information maybe received. For instance, registration may be received by the remoteuser computing device 170, 175. In some examples, the user may inputregistration information such as name or other identifier, contactinformation, account information, profile requests (e.g., amount limits,event type limits, and the like) into the remote user computing device170, 175, which, in some examples, may be a mobile device of the user.

At step 208, biometric data of the user may be received by the remoteuser computing device 170, 175. In some examples, the user may providebiometric data such as fingerprint, voice print, retina or iris scan,and the like, via one or more sensors arranged in the remote usercomputing device 170, 175. In some examples, an application executing onthe remote user computing device 170, 175 may be used to collect thebiometric data.

At step 209, the registration information and biometric data may betransmitted to the enhanced biometric data generation and eventprocessing computing platform 110. In some examples, the registrationinformation and biometric data may be transmitted via the first wirelessconnection. In other examples, the first wireless connection might nolonger be activate and a second wireless connection may be establishedto transfer the registration information and biometric data.

At step 210, the registration information and enhanced biometric datamay be received by the enhanced biometric data generation and eventprocessing computing platform 110. At step 211, the user may beregistered. In some examples, registering the user may includegenerating a record associated with the user. The record may include thereceived user information and biometric information. Further,registering the user may include storing one or more user profilesassociated with the user. Each user profile having various differentlimits or controls, as discussed herein.

As mentioned above, if a user is already registered with the system,steps 205 through 211 may be omitted.

With reference to FIG. 2C, at step 212, a request for enhanced biometricdata may be received. If the user requesting the enhanced biometric datais already registered, this request may be the same request as receivedat step 201. If the user was not previously registered, this request maybe made subsequent to the request in step 201.

At step 213, a connection may be established between the remote usercomputing device 170, 175 and the enhanced biometric data generation andevent processing computing platform 110. In some examples, a secondwireless connection may be established and a communication session maybe initiated.

While the communication session is established, the request may betransmitted to the enhanced biometric data generation and eventprocessing computing platform 110 at step 214. At step 215, the requestmay be received by the enhanced biometric data generation and eventprocessing computing platform 110.

At step 216, information may be extracted from the request. Forinstance, if a user has indicated a particular profile to use, thatinformation may be extracted from the request. In another example, ifthe user has provided a date range or time period for which the enhancedbiometric data should be valid, that information may be extracted.Additionally or alternatively, the request may include informationassociated with one or more users to which the enhanced biometric datashould be transmitted (e.g., the requesting user, another user,authorized agent, or the like). This information may also be extracted.Other types of information may also be extracted.

At step 217, a user may be identified based on the received request,extracted information, or the like. At step 218, based on the identifieduser and extracted information, a user profile may be selected at step218. For instance, based on the extracted information associated withthe user, event, activation period, and the like, a user profile may beselected from a plurality of user profiles. The selected user profilemay include data that may be encoded into the enhanced biometric data.

With reference to FIG. 2D, at step 219, the enhanced biometric data maybe generated. As discussed herein, the enhanced biometric data mayinclude some or all of the actual biometric data of the user (e.g.,fingerprint, or the like). In some examples, the enhanced biometric datamay temporarily modify a portion of the biometric data to reflect theencoded limits based on the user profile selected. In another example,areas around the biometric data may be modified to include the encodedlimit data.

At step 220, the enhanced biometric data may be transmitted to a remoteuser computing device 170, 175. In some examples, the enhanced biometricdata may be configured to be projected onto a body part of a user orother device (e.g., projected using an application executing on theremote user computing device 170, 175). Additionally or alternatively,the enhanced biometric data may be transmitted and configured to beprinted onto an adhesive device, such as a sticker, temporary tattoo, orthe like.

In some examples, the enhanced biometric data may be transmitted to arequesting user or user associated with the user profile. In otherexamples, the enhanced biometric data may be transmitted to other users,such as an authorized agent of the requesting user or user associatedwith the user profile, caretaker of the requesting user or userassociated with the user profile, or the like. Accordingly, thearrangements discussed herein not only provide increased security whenusing biometric data for event processing, but also enables other users(e.g., users other than those for whom the biometric data has beenreceived) to use the biometric data of others in a modified fashion toprocess events.

At step 221, the enhanced biometric data may be received by the remoteuser computing device 170, 175. At step 222, an enhanced biometricoutput may be generated. For instance, the remote user computing device170, 175 may project the enhanced biometric data onto a user or otherdevice. In another example, the user may print the enhanced biometricdata via an application executing on the remote user computing deviceand via a printing device connected thereto. The enhanced biometric datamay then be adhered to the user, other user, mobile device, wearabledevice, or the like.

At step 223, a request to process an event may be received. Forinstance, a user may request processing of an event via the remote usercomputing device 170, 175. In some examples, the requested event may bea transaction, such as a purchase, withdrawal, check cashing, or thelike.

With reference to FIG. 2E, at step 224, a connection may be establishedbetween the remote user computing device 170, 175 and the enhancedbiometric data generation and event processing computing platform 110.For instance, a third wireless connection may be established between theremote user computing device 170, 175 and the enhanced biometric datageneration and event processing computing platform 110 and acommunication session may be initiated.

After initiating the communication session associated with the thirdwireless connection, at step 225, the request to process the event maybe transmitted to the enhanced biometric data generation and eventprocessing computing platform 110. The request may include event detailssuch as vendor name, amount of event, type of event, and the like.

At step 226, enhanced biometric data may be received via a biometricdata capture computing device 120. For instance, the enhanced biometricoutput may be used to provide enhanced biometric data to a vendor system(e.g., point of sale system) or other system being used in processingthe event via a biometric data capture computing device 120 associatedwith the system. At step 227, a connection may be established betweenthe biometric data capture computing device 120 and the enhancedbiometric data generation and event processing computing platform 110.For instance, another wireless communication session may be initiatedand, during the wireless communication session the received enhancedbiometric data may be transmitted to the enhanced biometric datageneration and event processing computing platform 110 in step 228.

With reference to FIG. 2F, at step 229, the enhanced biometric data andrequest for event processing may be received by the enhanced biometricdata generation and event processing computing platform 110. At step230, the received enhanced biometric data may be evaluated. Forinstance, the enhanced biometric data may be compared to pre-storedbiometric data associated with the user to determine whether thepre-stored biometric data matches the enhanced biometric data (orportion thereof reflecting the natural biometric data of the user). Ifnot, the event request may be denied. If so, event details may beevaluated in step 231. For instance, event details may be compared tocontrols or limits extracted from the enhanced biometric data and basedon the selected user profile. If the event details do not meet thecontrols or limits extracted from the enhanced biometric data, the eventrequest may be denied. If the event details are within the limitationsextracted, the event may be processed. For instance, funds may betransferred from a user account to a vendor account, an instruction maybe transmitted to a vendor system authorizing processing the event, andthe like.

At step 233, the enhanced biometric data generation and event processingcomputing platform 110 may determine whether a triggering event hasoccurred. For instance, a triggering event may include expiration of apredetermined time period for which the enhanced biometric data wasactivated, a final date in a date range for which the enhanced biometricdata was activated has passed, a single use of the enhanced biometricdata has occurred (e.g., in the case of single-use enhanced biometricdata).

With reference to FIG. 2G, if a triggering event has occurred, at step234 a command to deactivate the generated enhanced biometric data may begenerated. At step 235, the enhanced biometric data may be deactivatedat the enhanced biometric data generation and event processing computingplatform 110. For instance, the enhanced biometric data generated andstored may be deleted or may be flagged such that an event requestsincluding that enhanced biometric data are denied.

At step 236, a connection may be established between the enhancedbiometric data generation and event processing computing platform 110and the remote user computing device 170, 175. For instance, a wirelessconnection may be established and a communication session may beinitiated. At step 237, after the communication session has beeninitiated, the generated command to deactivate the enhanced biometricdata may be transmitted to the remote user computing device 170, 175. Atstep 238, the command may be received and the enhanced biometric datamay be deactivated and/or deleted from the remote user computing device170, 175.

FIG. 3 is a flow chart illustrating one example method of generatingenhanced biometric data according to one or more aspects describedherein. The processes illustrated in FIG. 3 are merely some exampleprocesses and functions. The steps shown may be performed in a differentorder, more steps may be added, or one or more steps may be omittedwithout departing from the invention.

At step 300, a user may register with the enhanced biometric datageneration and event processing computing platform 110. In examples inwhich the user is already registered, step 300 may be omitted. Asdiscussed above, registering the user may including receiving userinformation, biometric information of the user, and the like. In someexamples, registering the user may include transmitting, from theenhanced biometric data generation and event processing computing device110 to the remote user computing device 170, 175 and applicationconfigured to perform one or more functions described herein. Theapplication may then execute on the remote user computing device 170,175.

At step 302, a request for enhanced biometric data may be received. Forinstance, a user may request, via the remote user computing device 170,175, enhanced biometric data for use in processing one or more events,for use during a particular time period, or the like. In some examples,the request may include a particular user profile to associate with theenhanced biometric data, one or more desired limits or controls, orother details.

At step 304, the enhanced biometric data generation and event processingcomputing platform 110 may identify a user based on data included in therequest for enhanced biometric data. For example, the enhanced biometricdata generation and event processing computing platform 110 may identifythe user based on an identifier associated with the remote usercomputing device 170, 175 from which the request was received, from userinput, or the like.

At step 306, details may be extracted from the request. For instance,the enhanced biometric data generation and event processing computingplatform 110 may extract details associated with a desired user profile,desired limits (e.g., amounts, types of events, or the like), a timeperiod for which the enhanced biometric data should be active, and thelike.

At step 308, based on the identified user and the extracted details, theenhanced biometric data generation and event processing computingplatform 110 may select a user profile from a plurality of user profilesassociated with the user. The selected user profile may include one ormore criteria or limits extracted from the request.

At step 310, enhanced biometric data may be generated. For instance, theenhanced biometric data generation and event processing computingplatform 110 may generate enhanced biometric data including at least aportion of the biometric data of the user and well as other dataassociated with the user profile, limits, and the like.

At step 312, the enhanced biometric data may be transmitted to the user.For instance, the enhanced biometric data generation and eventprocessing computing platform 110 may transmit the generated enhancedbiometric data to the remote user computing device 170, 175. At step314, an enhanced biometric data output may be generated. For instance,the enhanced biometric data output may include projection of an imageincluding the enhanced biometric data onto a body part of the user, userdevice, or the like. In some examples, the enhanced biometric dataoutput may obscure a portion of the biometric data of the user (e.g., afingerprint) and temporarily modify the overall fingerprint to permit asufficient amount of biometric data to be recognized to identify orauthenticate the user, while including data related to the user profile,limits, and the like. In other examples, the enhanced biometric dataoutput may obscure the biometric data of the user and the output itselfmay include a reproduction of the biometric data or portion thereof, aswell as additional data.

In some examples, the enhanced biometric data output may include anadhesive device, such as a sticker or temporary tattoo that the user mayadhere to his or her body, a mobile device, a wearable device, or thelike.

FIG. 4 is a flow chart illustrating another example method of generatingenhanced biometric data according to one or more aspects describedherein. The processes illustrated in FIG. 4 are merely some exampleprocesses and functions. The steps shown may be performed in a differentorder, more steps may be added, or one or more steps may be omittedwithout departing from the invention.

At step 400, a user may register with the enhanced biometric datageneration and event processing computing platform 110. In examples inwhich the user is already registered, step 400 may be omitted. Asdiscussed above, registering the user may including receiving userinformation, biometric information of the user, and the like. In someexamples, registering the user may include transmitting, from theenhanced biometric data generation and event processing computing device110 to the remote user computing device 170 and application configuredto perform one or more functions described herein. The application maythen execute on the remote user computing device 170. In some examples,the enhanced biometric data may be transmitted to another remote usercomputing device 175. In those examples, the application may betransmitted to the other remote user computing device 175 as well.

At step 402, a request for enhanced biometric data may be received. Forinstance, a user may request, via the remote user computing device 170,enhanced biometric data for use in processing one or more events, foruse during a particular time period, or the like. In some examples, therequest may include a particular user profile to associate with theenhanced biometric data, one or more desired limits or controls, orother details. Further, the request may be made by a user associatedwith the user profiles. In some examples, the request may furtherinclude instructions for or identification of a recipient to whom theenhanced biometric data should be sent, if someone other than therequesting user.

At step 404, the enhanced biometric data generation and event processingcomputing platform 110 may identify a user (e.g., the requesting user)based on data included in the request for enhanced biometric data. Forexample, the enhanced biometric data generation and event processingcomputing platform 110 may identify the user based on an identifierassociated with the remote user computing device 170 from which therequest was received, from user input, or the like.

At step 406, details may be extracted from the request. For instance,the enhanced biometric data generation and event processing computingplatform 110 may extract details associated with a desired user profile,desired limits (e.g., amounts, types of events, or the like), a timeperiod for which the enhanced biometric data should be active, and thelike.

At step 408, based on the identified user and the extracted details, theenhanced biometric data generation and event processing computingplatform 110 may select a user profile from a plurality of user profilesassociated with the user. The selected user profile may include one ormore criteria or limits extracted from the request.

At step 410, enhanced biometric data may be generated. For instance, theenhanced biometric data generation and event processing computingplatform 110 may generate enhanced biometric data including at least aportion of the biometric data of the user and well as other dataassociated with the user profile, limits, and the like.

At step 412, the enhanced biometric data may be transmitted to theidentified recipient (e.g., a person other than the requesting user).For instance, the enhanced biometric data generation and eventprocessing computing platform 110 may transmit the generated enhancedbiometric data to the another remote user computing device 175, otherthan the remote user computing device 170 from which the request wasreceived. At step 414, an enhanced biometric data output may begenerated. For instance, the enhanced biometric data output may includeprojection of an image including the enhanced biometric data onto a bodypart of the user, user device, or the like. In some examples, theenhanced biometric data output may obscure a portion of the biometricdata of the user (e.g., a fingerprint) and temporarily modify theoverall fingerprint to permit a sufficient amount of biometric data tobe recognized to identify or authenticate the user, while including datarelated to the user profile, limits, and the like. In other examples,the enhanced biometric data output may obscure the biometric data of theuser and the output itself may include a reproduction of the biometricdata or portion thereof, as well as additional data.

In some examples, the enhanced biometric data output may include anadhesive device, such as a sticker or temporary tattoo that the user mayadhere to his or her body, a mobile device, a wearable device, or thelike.

FIG. 5 is a flow chart illustrating one example method of processing anevent using enhanced biometric data according to one or more aspectsdescribed herein. The processes illustrated in FIG. 5 are merely someexample processes and functions. The steps shown may be performed in adifferent order, more steps may be added, or one or more steps may beomitted without departing from the invention.

At step 500, a request for event processing may be received. Forinstance, the enhanced biometric data generation and event processingcomputing platform 110 may receive a request to process an event from aremote user computing device 170, 175. In some examples, the remote usercomputing device requesting event processing may be associated with auser who requested the enhanced biometric data (e.g., remote usercomputing device 170 in FIG. 4). In other examples, the remote usercomputing device requesting event processing may be associated withanother authorized user (e.g., remote user computing device 175 in FIG.4). The request may include details of the event (e.g., amount, type, orthe like).

At step 502, the enhanced biometric data may be received. For instance,a biometric data capture computing device 120 may capture the enhancedbiometric data from the enhanced biometric data output and may transmitthe enhanced biometric data to the enhanced biometric data generationand event processing computing platform 110.

At step 504, event details may be extracted from the request for eventprocessing. For instance, a type of event, amount of event, vendor, orthe like, may be extracted.

At step 506, the received enhanced biometric data may be compared topre-stored biometric data for the user. In examples in which theenhanced biometric data is transmitted to the requesting user, theenhanced biometric data may be compared to the requesting user'sbiometric data. In examples in which the enhanced biometric data wastransmitted to another authorized user, the enhanced biometric data maybe compared to biometric data of the user associated with the userprofile, request for enhanced biometric data, or the like.

At step 508, a determination may be made as to whether the enhancedbiometric data matches the pre-stored biometric data. If not, therequest for event processing may be denied at step 510. If so, theenhanced biometric data generation and event processing computingplatform 110 may compare the extracted event details to criteria,limits, or the like extracted from the enhanced biometric data (e.g.,based on the user profile data associated with the enhanced biometricdata).

At step 512, a determination may be made as to whether the extractedevent details are within the limits or criteria determined from theenhanced biometric data. If not, the request for event processing may bedenied at step 510. If so, the event may be processed at step 514.

At step 516, a determination may be made as to whether a triggeringevent has occurred. As discussed herein, a triggering event may includeexpiration of a predetermined time period for which the enhancedbiometric data was activated, the end of a predetermined date range,indication of a predetermined number of uses being reached, or the like.If a triggering event has not occurred at step 516, at step 518 theenhanced biometric data may remain activated. If, at step 516, atriggering event has occurred, the enhanced biometric data may bedeactivated at step 520. For instance, the enhanced biometric datageneration and event processing computing platform 110 may generate acommand to deactivate, delete or the like, the enhanced biometric data.In some examples, the enhanced biometric data generation and eventprocessing computing platform 110 may transmit the command to the remoteuser computing device 170, 175 to which the enhanced biometric data wastransmitted to deactivate, delete, or the like, the enhanced biometricdata on the remote user computing device 170, 175.

FIGS. 6A-6C illustrate some examples of biometric data and enhancedbiometric data in accordance with one or more aspects described herein.FIG. 6A illustrates natural biometric data of a user, such as afingerprint. The biometric data 600 includes a fingerprint of a userthat may be provided via a registration process, as discussed herein.The biometric data 600 includes only the fingerprint of the user and noenhancements have been made to the biometric data 600.

FIG. 6B illustrates one example of enhanced biometric data. The enhancedbiometric data 620 includes the naturally occurring fingerprint 622 ofthe user, as well as an enhancement 624 in the form of machine readablecode. The enhancement 624 may be a bar code, quick response (QR) code,or other machine readable code. The enhancement 624 may include dataassociated with a user profile of the user (e.g., the user associatedwith the fingerprint 622), such as event limits, types of eventspermitted for processing, and the like. In some examples, theenhancement 624 may overlay a portion of the fingerprint 622, such thatthe enhancement 624 may temporarily modify the fingerprint data. Inother examples, the enhancement 624 may be semi-transparent to permitportions of the fingerprint 622 to be visible and/or readable throughthe enhanced portion to temporarily modify the image of the fingerprintor the naturally occurring fingerprint of the user.

FIG. 6C illustrates another example of enhanced biometric data. Theenhanced biometric data 640 includes the naturally occurring fingerprint642 of the user, as well as an enhancement 644. As shown in FIG. 6C, theenhancement 644 is arranged to not overlay the fingerprint 622 of theuser, such that the entire fingerprint 622 is visible and/or readable,along with the enhancement.

The examples of enhanced biometric data shown may be projected as animage from a remote user computing device, may be printed as a stickeror other adhesive device, such as a temporary tattoo that can be worn bythe user, or the like. As discussed herein, the enhanced biometric datamay temporarily modify the biometric data of the user such that theenhanced biometric data will be deactivated upon occurrence of atriggering event.

Although several aspects discussed herein are directed to providingenhanced biometric data in the form of fingerprint data, other types ofbiometric data may also be used. For example, FIG. 7 illustrates anotherexample of enhanced biometric data that may be used with a retinal oriris scan of a user. In some examples, the enhancement 724 may appear ona lens of a pair of glasses 700. In some examples, the glasses 700 maybe augmented reality glasses. In other examples, the glasses 700 may betraditional glasses to which an enhanced biometric data output isadhered. The enhancement 724 may include data associated with the userprofile, such as limits, criteria for processing events, and the like.Similar to the other examples discussed herein, the enhancement 724 maypermit some or all of the naturally occurring biometric data (e.g., irisor retina) to be visible or readable through the lens in addition to theenhancement.

FIG. 8 illustrates yet another example of enhanced biometric data. FIG.8 includes a mobile device 800, such as a smartphone. The mobile device800 may be a wearable device or other suitable device. The enhancedbiometric data 802 is shown on a rear of the mobile device 800. Asdiscussed herein, the enhanced biometric data output may be a sticker orother adhesive device and may adhere to a mobile device 800, or otherdevice. In examples, in which the enhanced biometric data is transmittedto a user other than the requesting user (e.g., an authorized agent ofthe requesting user), the enhanced biometric data may be printed andadhered to a device, such as mobile device 800 to enable the authorizedagent to process events for the requesting user without the requestinguser being present to provide his or her biometric data.

As discussed herein, the arrangements described provide for improvedflexibility and security when using biometric data to process events.For instance, the use of enhanced biometric data that can be deactivatedafter a triggering event makes biometric data more difficult toduplicate in order to engage in unauthorized activity. As biometric datais used more often in event processing, the risk of exposure of thebiometric data to potential unauthorized actors increases. Accordingly,by temporarily modifying the biometric data (e.g., creating a tokenizedimprint or image to enhanced the natural biometric data of the user)with additional data in generating the enhanced biometric data, there isless risk of an unauthorized actor obtaining and duplicating thebiometric data of the user.

As discussed above, the enhanced biometric data may be output onto anenhanced biometric data output. In some examples, the enhancement and/orbiometric data may be distributed among two or more different enhancedbiometric outputs. Accordingly, in some examples, all of the enhancedbiometric outputs may be required in order to process an event. This mayadd an additional layer of security in event processing.

The enhanced biometric data may be used to facilitate secure eventprocessing for a user. For example, a user may select (or the system mayselect) a user profile including limits for transaction amounts, apredetermined time period for which the enhanced biometric data will beactive, and the like. For instance, if a user is going on vacation, heor she may want to limit the potential risk of unauthorized activity.Accordingly, enhanced biometric data may be generated from a “vacation”user profile that includes a limit of $250 on any transaction processed(or authorized for processing) using the enhanced biometric data and maydeactivate the enhanced biometric data after one week.

Additionally or alternatively, the enhanced biometric data may be usedto permit an authorized agent of a user to process events withoutrequiring the presence of the user. For instance, a user may generateenhanced biometric data and transmit it to the mobile device of acaretaker, of a child away at college, or the like. Accordingly, therecipient can process events (within the limits established by the userprofile used to generate the enhanced biometric data) without the userbeing present to provide biometric data.

In some examples, the enhanced biometric data and/or enhanced biometricdata output may be transferrable. For instance, the enhanced biometricdata output may be generated for an initial user and then may betransferred to a second, different user. In some examples, this mayinclude removal of the adhesive device from a first location andadhering it to a second location. In examples, in which the enhancedbiometric data output is a projection of an image, the image may betransmitted from a first computing device to a second computing device.In some examples, transmission of the image for projection to the seconddevice may include deactivating the image on the first device.

In some arrangements, transferring the enhanced biometric data orenhanced biometric data output may be used in family situations. Forinstance, if a family is on a trip, the enhanced biometric data may betransferred from one family member to another to enable all familymembers to use the enhanced biometric data and/or enhanced biometricdata output as desired.

FIG. 9 depicts an illustrative operating environment in which variousaspects of the present disclosure may be implemented in accordance withone or more example embodiments. Referring to FIG. 9, computing systemenvironment 900 may be used according to one or more illustrativeembodiments. Computing system environment 900 is only one example of asuitable computing environment and is not intended to suggest anylimitation as to the scope of use or functionality contained in thedisclosure. Computing system environment 900 should not be interpretedas having any dependency or requirement relating to any one orcombination of components shown in illustrative computing systemenvironment 900.

Computing system environment 900 may include enhanced biometric datageneration and event processing computing device 901 having processor903 for controlling overall operation of enhanced biometric datageneration and event processing computing device 901 and its associatedcomponents, including Random Access Memory (RAM) 905, Read-Only Memory(ROM) 907, communications module 909, and memory 915. Enhanced biometricdata generation and event processing computing device 901 may include avariety of computer readable media. Computer readable media may be anyavailable media that may be accessed by enhanced biometric datageneration and event processing computing device 901, may benon-transitory, and may include volatile and nonvolatile, removable andnon-removable media implemented in any method or technology for storageof information such as computer-readable instructions, object code, datastructures, program modules, or other data. Examples of computerreadable media may include Random Access Memory (RAM), Read Only Memory(ROM), Electronically Erasable Programmable Read-Only Memory (EEPROM),flash memory or other memory technology, Compact Disk Read-Only Memory(CD-ROM), Digital Versatile Disk (DVD) or other optical disk storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, or any other medium that can be used to storethe desired information and that can be accessed by computing device901.

Although not required, various aspects described herein may be embodiedas a method, a data transfer system, or as a computer-readable mediumstoring computer-executable instructions. For example, acomputer-readable medium storing instructions to cause a processor toperform steps of a method in accordance with aspects of the disclosedembodiments is contemplated. For example, aspects of method stepsdisclosed herein may be executed on a processor on enhanced biometricdata generation and event processing computing device 901. Such aprocessor may execute computer-executable instructions stored on acomputer-readable medium.

Software may be stored within memory 915 and/or storage to provideinstructions to processor 903 for enabling enhanced biometric datageneration and event processing computing device 901 to perform variousfunctions as discussed herein. For example, memory 915 may storesoftware used by enhanced biometric data generation and event processingcomputing device 901, such as operating system 917, application programs919, and associated database 921. Also, some or all of the computerexecutable instructions for enhanced biometric data generation and eventprocessing computing device 901 may be embodied in hardware or firmware.Although not shown, RAM 905 may include one or more applicationsrepresenting the application data stored in RAM 905 while enhancedbiometric data generation and event processing computing device 901 ison and corresponding software applications (e.g., software tasks) arerunning on enhanced biometric data generation and event processingcomputing device 901.

Communications module 909 may include a microphone, keypad, touchscreen, and/or stylus through which a user of enhanced biometric datageneration and event processing computing device 901 may provide input,and may also include one or more of a speaker for providing audio outputand a video display device for providing textual, audiovisual and/orgraphical output. Computing system environment 900 may also includeoptical scanners (not shown).

Enhanced biometric data generation and event processing computing device901 may operate in a networked environment supporting connections to oneor more remote computing devices, such as computing devices 941 and 951.Computing devices 941 and 951 may be personal computing devices orservers that include any or all of the elements described above relativeto enhanced biometric data generation and event processing computingdevice 901.

The network connections depicted in FIG. 9 may include Local AreaNetwork (LAN) 925 and Wide Area Network (WAN) 929, as well as othernetworks. When used in a LAN networking environment, enhanced biometricdata generation and event processing computing device 901 may beconnected to LAN 925 through a network interface or adapter incommunications module 909. When used in a WAN networking environment,enhanced biometric data generation and event processing computing device901 may include a modem in communications module 909 or other means forestablishing communications over WAN 929, such as network 931 (e.g.,public network, private network, Internet, intranet, and the like). Thenetwork connections shown are illustrative and other means ofestablishing a communications link between the computing devices may beused. Various well-known protocols such as Transmission ControlProtocol/Internet Protocol (TCP/IP), Ethernet, File Transfer Protocol(FTP), Hypertext Transfer Protocol (HTTP) and the like may be used, andthe system can be operated in a client-server configuration to permit auser to retrieve web pages from a web-based server. Any of variousconventional web browsers can be used to display and manipulate data onweb pages.

The disclosure is operational with numerous other computing systemenvironments or configurations. Examples of computing systems,environments, and/or configurations that may be suitable for use withthe disclosed embodiments include, but are not limited to, personalcomputers (PCs), server computers, hand-held or laptop devices, smartphones, multiprocessor systems, microprocessor-based systems, set topboxes, programmable consumer electronics, network PCs, minicomputers,mainframe computers, distributed computing environments that include anyof the above systems or devices, and the like and are configured toperform the functions described herein.

FIG. 10 depicts an illustrative block diagram of workstations andservers that may be used to implement the processes and functions ofcertain aspects of the present disclosure in accordance with one or moreexample embodiments. Referring to FIG. 10, illustrative system 1000 maybe used for implementing example embodiments according to the presentdisclosure. As illustrated, system 1000 may include one or moreworkstation computers 1001. Workstation 1001 may be, for example, adesktop computer, a smartphone, a wireless device, a tablet computer, alaptop computer, and the like, configured to perform various processesdescribed herein. Workstations 1001 may be local or remote, and may beconnected by one of communications links 1002 to computer network 1003that is linked via communications link 1005 to enhanced biometric datageneration and event processing server 1004. In system 1000, enhancedbiometric data generation and event processing server 1004 may be aserver, processor, computer, or data processing device, or combinationof the same, configured to perform the functions and/or processesdescribed herein. Server 1004 may be used to receive requests forenhanced biometric data, process requests, receive requests for eventprocessing, evaluate received enhanced biometric data, deactivateenhanced biometric data, and the like.

Computer network 1003 may be any suitable computer network including theInternet, an intranet, a Wide-Area Network (WAN), a Local-Area Network(LAN), a wireless network, a Digital Subscriber Line (DSL) network, aframe relay network, an Asynchronous Transfer Mode network, a VirtualPrivate Network (VPN), or any combination of any of the same.Communications links 1002 and 1005 may be communications links suitablefor communicating between workstations 1001 and enhanced biometric datageneration and event processing server 1004, such as network links,dial-up links, wireless links, hard-wired links, as well as networktypes developed in the future, and the like.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,Application-Specific Integrated Circuits (ASICs), Field ProgrammableGate Arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,one or more steps described with respect to one figure may be used incombination with one or more steps described with respect to anotherfigure, and/or one or more depicted steps may be optional in accordancewith aspects of the disclosure.

What is claimed is:
 1. A computing platform, comprising: at least oneprocessor; a communication interface communicatively coupled to the atleast one processor; and memory storing computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: receive user input requesting enhanced biometric data, theuser input including additional information associated with the requestincluding at least a time period for which the enhanced biometric datawill be active and types of events for processing; identify, based onthe user input, a user associated with the request; identify, from aplurality of user profiles associated with the user and based on theadditional information and the identified user associated with therequest, a user profile of the identified user; retrieve, from adatabase storing the plurality of user profiles, the identified userprofile; generate, based on the user profile, the enhanced biometricdata of the user, the enhanced biometric data including biometric dataof the identified user and additional, machine readable informationindicating one or more limits on use of the enhanced biometric data, theone or more limits including at least the time period for which theenhanced biometric data will be active and the types of events forprocessing; and transmit the generated enhanced biometric data of theuser to a computing device.
 2. The computing platform of claim 1,further including instructions that, when executed, cause the computingplatform to: cause the computing device to generate an enhancedbiometric data output.
 3. The computing platform of claim 2, wherein theenhanced biometric data output includes an adhesive device including theenhanced biometric data of the user.
 4. The computing platform of claim2, wherein the enhanced biometric data output includes an imageprojected by the computing device and including the enhanced biometricdata of the user.
 5. The computing platform of claim 2, furtherincluding instructions that, when executed, cause the computing platformto: determine whether a triggering event has occurred; responsive todetermining that a triggering event has occurred, deactivating theenhanced biometric data of the user; and responsive to determining thata triggering event has not occurred, maintaining the enhanced biometricdata of the user as activated.
 6. The computing platform of claim 5,wherein the triggering event includes one of: expiration of the timeperiod for which the enhanced biometric data will be active or athreshold number of uses of the enhanced biometric data of the userbeing reached.
 7. The computing platform of claim 1, wherein theplurality of user profiles each include one or more differentpredetermined limits on use of the enhanced biometric data generatedbased on a respective user profile.
 8. A method, comprising: at acomputing platform comprising at least one processor, memory, and acommunication interface: receiving, by the at least one processor andvia the communication interface, user input requesting enhancedbiometric data, the user input including additional informationassociated with the request including at least a time period for whichthe enhanced biometric data will be active and types of events forprocessing; identifying, by the at least one processor and based on theuser input, the user associated with the request; identify, by the atleast one processor and from a plurality of user profiles associatedwith the user and based on the additional information and the identifieduser associated with the request, a user profile of the identified user;retrieving, from a database storing the plurality of user profiles, theidentified user profile; generating, by the at least one processor andbased on the user profile, the enhanced biometric data of the user, theenhanced biometric data including biometric data of the identified userand additional, machine readable information indicating one or morelimits on use of the enhanced biometric data, the one or more limitsincluding at least the time period for which the enhanced biometric datawill be active and the types of events for processing; and transmitting,by the at least one processor and via the communication interface, thegenerated enhanced biometric data of the user to a computing device. 9.The method of claim 8, further including causing, by the at least oneprocessor, the computing device to generate an enhanced biometric dataoutput.
 10. The method of claim 9, wherein the enhanced biometric dataoutput includes an adhesive device including the enhanced biometric dataof the user.
 11. The method of claim 9, wherein the enhanced biometricdata output includes an image projected by the computing device andincluding the enhanced biometric data of the user.
 12. The method ofclaim 9, further including: determine whether a triggering event hasoccurred; and responsive to determining that a triggering event hasoccurred, deactivating the enhanced biometric data of the user.
 13. Themethod of claim 12, wherein the triggering event includes one of:expiration of the time period for which the enhanced biometric data willbe activated or a threshold number of uses of the enhanced biometricdata of the user being reached.
 14. The method of claim 9, furtherincluding: determining whether a triggering event has occurred; andresponsive to determining that a triggering event has not occurred,maintaining the enhanced biometric data of the user as activated. 15.The method of claim 8, wherein the plurality of user profiles eachinclude one or more different predetermined limits on use of theenhanced biometric data generated based on a respective user profile.16. One or more non-transitory computer-readable media storinginstructions that, when executed by a computing platform comprising atleast one processor, memory, and a communication interface, cause thecomputing platform to: receive user input requesting enhanced biometricdata, the user input including additional information associated withthe request including at least a time period for which the enhancedbiometric data will be active and types of events for processing;identify, based on the user input, the user associated with the request;retrieve, from a plurality of user profiles associated with the user andbased on the additional information and the identified user associatedwith the request, a user profile of the identified user; retrieve, froma database storing the plurality of user profiles, the identified userprofile; generate, based on the user profile, the enhanced biometricdata of the user, the enhanced biometric data including biometric dataof the identified user and additional, machine readable informationindicating one or more limits on use of the enhanced biometric data, theone or more limits including at least the time period for which theenhanced biometric data will be active and the types of events forprocessing; and transmit the generated enhanced biometric data of theuser to a computing device.
 17. The one or more non-transitorycomputer-readable media of claim 16, further including instructionsthat, when executed, cause the computing platform to: cause thecomputing device to generate an enhanced biometric data output.
 18. Theone or more non-transitory computer-readable media of claim 17, whereinthe enhanced biometric data output includes an adhesive device includingthe enhanced biometric data of the user.
 19. The one or morenon-transitory computer-readable media of claim 17, wherein the enhancedbiometric data output includes an image projected by the computingdevice and including the enhanced biometric data of the first user. 20.The one or more non-transitory computer-readable media of claim 17,further including instructions that, when executed, cause the computingplatform to: determine whether a triggering event has occurred;responsive to determining that a triggering event has occurred,deactivating the enhanced biometric data of the user; and responsive todetermining that a triggering event has not occurred, maintaining theenhanced biometric data of the user as activated.
 21. The one or morenon-transitory computer-readable media of claim 20, wherein thetriggering event includes one of: expiration of the time period forwhich the enhanced biometric data will be active or a threshold numberof uses of the enhanced biometric data of the user being reached. 22.The one or more non-transitory computer-readable media of claim 16,wherein the plurality of user profiles each include one or moredifferent predetermined limits on use of the enhanced biometric datagenerated based on a respective user profile.