Wells Fargo Bank N.A.
|Wells Fargo Bank N.A. Patent applications|
|Patent application number||Title||Published|
|20130036301||Distributed Cryptographic Management for Computer Systems - A distributed cryptographic management system can include: a central key management service accessible through the network and having a database associated therewith; an approval module programed to receive approval for any client machines connectable to the network and applications associated with the client machines, the database storing records for the client machines, and a key management domain being defined by all approved client machines and applications; and an agent module programmed to provide key management agents, wherein the key management agents are transferable and installable on any of the approved client machines and applications within the key management domain.||02-07-2013|
|20120226615||CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented.||09-06-2012|
|20120179911||CRYPTOGRAPHIC KEY BACKUP AND ESCROW SYSTEM - A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module.||07-12-2012|
|20110238992||APPLICATION CONTROLLED ENCRYPTION OF WEB BROWSER CACHED DATA - A browser cache-securing component facilitates online communication of confidential data, such as for financial information, purchasing transactions, or user identification. Caching webpages for subsequent presentation enhances user productivity and efficiency while reducing burdens on network resources. Yet, the security risks of intrusions into cache memory are mitigated by retaining encrypted data in cache memory without prior decryption. A modest overhead in decrypting when and if the webpage is to be presented again gains a security and privacy advantage without taking away functionality. Decrypted versions of confidential data can thereby be relegated to volatile memory. Upon termination of a session, a session key shared by a network server is deleted, preventing subsequent decryption. Executing the browser cache-securing component in a virtual machine environment allows multiple browser types to benefit from the security feature.||09-29-2011|
|20110196781||MULTIPLE LOAN PAYMENT OPTION SALES TOOL - A multiple option loan presentation apparatus and method allows a loan agent to communicate a non-traditional loan product to a customer. Non-traditional mortgage products such as pick-a-payment loans allow a borrower to exchange lower payments during an initial period for higher payments layer in an amortization period. Some borrowers do not want to accepting the risk associated with adjustable rate mortgages (ARMs) for increases in interest rates, but are still desirous of options for reduced monthly payments. Combining fixed rate loans with an option for interest-only or minimum payments allows this flexibility, but places a premium on being able to graphically depict the implications of these choices. Thereby, the borrower can make an informed decision and the loan agent is able to more quickly conclude the transaction. In particular, the minimum payments constraints and changes in amounts can be made more intuitive.||08-11-2011|
|20110066552||CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented.||03-17-2011|
|20110058673||PUBLIC KEY ENCRYPTION FOR GROUPS - A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group.||03-10-2011|
|20100145835||MOBILE DEVICE CREDIT ACCOUNT - Providing for a mobile communication device (MCD) credit account and credit transactions by way of such an MCD is described herein. As an example, a credit account sponsored by a financial or commercial entity can be associated with a unique ID of an MCD. The MCD can interface with another electronic device and initiate credit transactions, such as commercial purchases, credit transfers, currency conversions, and the like, via the interface. Further, rules provided by the sponsoring entity can guide such transactions, enforcing credit limits, for instance. A management component can then synchronize transactions conducted by the device with a server of a financial institution over a remote communication interface, such as the Internet or a cellular/mobile communication network. Accordingly, a mobile device can replace a traditional credit card in transacting credit business.||06-10-2010|
|20100017859||Authentication system for networked computer applications - A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated.||01-21-2010|
Patent applications by Wells Fargo Bank N.A.