Wells Fargo Bank N.A.
|Wells Fargo Bank N.A. Patent applications|
|Patent application number||Title||Published|
|20130333002||DYNAMIC AUTHENTICATION IN ALTERNATE OPERATING ENVIRONMENT - Systems and methods that employ dynamic credentials across distinct authentication standards can be used to reduce the burden associated with repeated re-authentication. A utility can be employed during logon in an alternate operating environment that stores information from the logon dynamically and generates a credential file that is employed to grant access to a resource without repeating the earlier logon procedure, even if the device changes its user state. After processes requiring resource access are complete, or when an allowed time expires, the granted access is revoked and the device returns to a default or standard authentication technique.||12-12-2013|
|20130159053||Capacity Management Index System and Method - A system and method is provided that generates an index, providing predictive and actionable intelligence to ensure that a Technology Infrastructure Group (TIG) makes tactical and strategic decisions in support of needs of customers. The invention measures overall health of an infrastructure, specifically with respect to how efficiently various services meet demand placed upon capacity by various Lines of Business. The invention provides an overall assessment of infrastructure capacity management and drills down to various services, components, subcomponents, etc. The invention provides a forecasting tool in which estimates made are not based only upon business forecasts provided by each Line of Business, but also upon forecasts developed by correlating external indicators with historical business volumes. Historical forecasts are compared to actual values to derive a confidence factor used for weighting future Line of Business forecasts. The combined, weighted forecasts obtained are more robust than any individual forecasts on their own.||06-20-2013|
|20130151423||VALUATION OF DATA - Systems and methods that provide for valuing data are discussed herein. These systems and methods can provide for determining an initial measure of value of the data asset and calculating a baseline monetary ratio based at least in part on the initial measure of value. Additionally, the innovation can include measuring one or more quality factors associated with the data asset, measuring a utility associated with the data asset, calculating a new measure of value of the data asset based at least in part on the baseline monetary ratio, the utility, and the one or more quality factors, and reporting the new measure of value.||06-13-2013|
|20130036301||Distributed Cryptographic Management for Computer Systems - A distributed cryptographic management system can include: a central key management service accessible through the network and having a database associated therewith; an approval module programed to receive approval for any client machines connectable to the network and applications associated with the client machines, the database storing records for the client machines, and a key management domain being defined by all approved client machines and applications; and an agent module programmed to provide key management agents, wherein the key management agents are transferable and installable on any of the approved client machines and applications within the key management domain.||02-07-2013|
|20120226615||CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented.||09-06-2012|
|20120179911||CRYPTOGRAPHIC KEY BACKUP AND ESCROW SYSTEM - A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.||07-12-2012|
|20110238992||APPLICATION CONTROLLED ENCRYPTION OF WEB BROWSER CACHED DATA - A browser cache-securing component facilitates online communication of confidential data, such as for financial information, purchasing transactions, or user identification. Caching webpages for subsequent presentation enhances user productivity and efficiency while reducing burdens on network resources. Yet, the security risks of intrusions into cache memory are mitigated by retaining encrypted data in cache memory without prior decryption. A modest overhead in decrypting when and if the webpage is to be presented again gains a security and privacy advantage without taking away functionality. Decrypted versions of confidential data can thereby be relegated to volatile memory. Upon termination of a session, a session key shared by a network server is deleted, preventing subsequent decryption. Executing the browser cache-securing component in a virtual machine environment allows multiple browser types to benefit from the security feature.||09-29-2011|
|20110196781||MULTIPLE LOAN PAYMENT OPTION SALES TOOL - A multiple option loan presentation apparatus and method allows a loan agent to communicate a non-traditional loan product to a customer. Non-traditional mortgage products such as pick-a-payment loans allow a borrower to exchange lower payments during an initial period for higher payments layer in an amortization period. Some borrowers do not want to accepting the risk associated with adjustable rate mortgages (ARMs) for increases in interest rates, but are still desirous of options for reduced monthly payments. Combining fixed rate loans with an option for interest-only or minimum payments allows this flexibility, but places a premium on being able to graphically depict the implications of these choices. Thereby, the borrower can make an informed decision and the loan agent is able to more quickly conclude the transaction. In particular, the minimum payments constraints and changes in amounts can be made more intuitive.||08-11-2011|
|20110066552||CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented.||03-17-2011|
|20110058673||PUBLIC KEY ENCRYPTION FOR GROUPS - A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.||03-10-2011|
|20100145835||MOBILE DEVICE CREDIT ACCOUNT - Providing for a mobile communication device (MCD) credit account and credit transactions by way of such an MCD is described herein. As an example, a credit account sponsored by a financial or commercial entity can be associated with a unique ID of an MCD. The MCD can interface with another electronic device and initiate credit transactions, such as commercial purchases, credit transfers, currency conversions, and the like, via the interface. Further, rules provided by the sponsoring entity can guide such transactions, enforcing credit limits, for instance. A management component can then synchronize transactions conducted by the device with a server of a financial institution over a remote communication interface, such as the Internet or a cellular/mobile communication network. Accordingly, a mobile device can replace a traditional credit card in transacting credit business.||06-10-2010|
|20100017859||Authentication system for networked computer applications - A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.||01-21-2010|
Patent applications by Wells Fargo Bank N.A.