Wells Fargo Bank N.A. Patent applications |
Patent application number | Title | Published |
20160125522 | AUTOMATIC ACCOUNT LOCKOUT - Systems and methods of automatic lockout of an online account are discussed. One example method can comprise identifying out of pattern login behavior on the account. The out of pattern behavior can include one or more interactions wherein at least one of an IP address, a device identification, or a location associated with the one or more interactions that does not match past interactions. The method can also include determining that fraud/unauthorized money movement has occurred in the account, and automatically logging into the customer account with incorrect credentials a sufficient number of times to trigger a lockout from the account. Additionally, the method can include receiving, at a financial institution associated with the account, at least one form of authentication from a customer associated with the account to verify an identity of the customer, and directing the customer to change login credentials on the account. | 05-05-2016 |
20160105425 | BIDIRECTIONAL AUTHENTICATION - Systems, methods, and other embodiments associated with bidirectional authentication are described herein. According to one embodiment, a method includes a user receiving a communication from an entity. In response to receiving the communication from the entity, the method further includes generating a token. The token may be a one-time passcode, personal identification number (PIN), alphanumeric value, code word, pass phrase, or security question. The token is received by a device of the user. Additionally, the token is transmitted to the entity. The user may then receive evidence of the token from the entity. | 04-14-2016 |
20160098710 | INTELLIGENT AUTHENTICATION - Systems, methods, and other embodiments associated with intelligent authentication. According to one embodiment, a system includes a transaction logic configured to receive transaction metadata associated with an attempted transaction. The transaction logic is also configured to identify a user attempting the attempted transaction. The system further includes an activity logic configured to access an activity log associated with the user. The activity log includes values corresponding to previous transactions made by the user and any additional information provided by 3 | 04-07-2016 |
20160098548 | SETTING AN AUTHORIZATION LEVEL AT ENROLLMENT - Systems, methods, and other embodiments associated with setting an authorization level at enrollment. According to one embodiment, a method includes a accessing an interface on a device. Initiation information for a user of the device is provided to an authorizer. The authorizer is associated with a class. Verification data is received from the authorizer. An enrollment token is then generated based on the verification data. The enrollment token includes an authorization level that defines security parameters for the device. | 04-07-2016 |
20160048985 | DENSITY GRADIENT ANALYSIS TOOL - Systems, methods, and other embodiments associated with density gradient analysis tool for heat mapping systems. According to one embodiment, a method includes receiving data points. The method further includes calculating a data distribution of the data points. The data distribution has bins, and the bins represent an intervals. The method further includes rendering a heat map based, at least in part, on the data distribution. The heat map includes regions corresponding to the bins. | 02-18-2016 |
20160044625 | LOCATION TRACKING - One or more embodiments of techniques or systems for location tracking are provided herein. A system for location tracking may be utilized to track or determine one or more locations for one or more devices of one or more users. A tracking system or control component may be utilized to access or initiate requests for location tracking, such as for legitimate purposes or business reasons. For example, a system for location tracking may be implemented as an application or tracking application installed on a mobile device or a device or a user. A device may transmit a key to a third party and encrypted location data to a tracking entity. The application may have a front-end interface (e.g., for users being tracked) and a back-end interface (e.g., for users initiating tracking). In this manner, location tracking is provided while promoting privacy and safety. | 02-11-2016 |
20160044048 | AUTOMATED SECONDARY LINKING FOR FRAUD DETECTION SYSTEMS - Systems, methods, and other embodiments associated with automated secondary linking for fraud detection systems. According to one embodiment, a system includes a parsing logic configured to receive an incoming fraud report based on a first fraud detection strategy. The parse logic is also configured to parse the incoming fraud report into fraud data. The system further includes a search logic configured to search a set of fraud reports to identify instances of the fraud data. The system also includes an alert logic configured to generate an alert in response to an instance of the fraud data being identified in the set of fraud reports. | 02-11-2016 |
20160036930 | WEB ANALYTICS TAGS - Systems and methods that facilitate capturing web analytics data are disclosed. One example method can include the acts of receiving a web page request from a client computer and providing the requested web page to the client computer. The requested web page can include one or more analytics tags. The method can also include capturing at least one of client side information, performance of, or one or more user interactions with the web page and providing the captured information to a web server associated with the web page. These interactions can include user actions that do not include a call to a web server, such as actions that occur during an AJAX flow. | 02-04-2016 |
20160005044 | FRAUD DETECTION - Systems and methods of fraud prevention are discussed. One such method can include the acts of monitoring one or more events associated with at least one account at a financial institution; analyzing characteristics associated with a first event of the one or more events; determining whether to designate the first event as risky; and implementing one or more measures in response to the designation of the first event as risky. | 01-07-2016 |
20150370873 | DATA AGGREGATION AND REPORTING ENVIRONMENT FOR DATA CENTER INFRASTRUCTURE MANAGEMENT - Systems and methods that facilitate data center infrastructure management are discussed. One such system can include a plurality of data center infrastructure management (DCIM) tools. Each DCIM tool can maintain data associated with one or more data centers. Such a system can also include a data aggregation component that can extract the maintained data from at least two of the plurality of DCIM tools and can transform the extracted data into a common format. Such a system can also include an aggregated database that stores the extracted data, and can include a user interface that can provide for simultaneous access to the plurality of DCIM tools. | 12-24-2015 |
20150324467 | PROFILE MANAGEMENT - One or more embodiments of techniques or systems for profile management are provided herein. In one or more embodiments, a first entity may create a profile by providing content via an interface or a first interface. A second entity may manage one or more aspects of the profile via a second interface. The amount of control the second entity has over one or more portions of the profile may be related to or based on content of the profile or a relationship between the first entity and the second entity. For example, the second entity may screen content of the profile from public view. Additionally, profiles may be searched internally within an organization or externally, such as for outsourcing or to provide vendors or clients with more customized solutions. In this manner, profile management is provided. | 11-12-2015 |
20150269946 | FRAUD DETECTION DATABASE - Embodiments of techniques or systems for fraud detection are provided herein. A communication may be received where the communication includes one or more voice signals from an individual. Frequency responses associated with these voice signals may be determined and analyzed and utilized to determine whether or not potential fraudulent activity is occurring. For example, if a frequency response is greater than a frequency threshold, potential fraudulent activity may be determined. Further, frequency responses may be cross referenced with voice biometrics, voice printing, or fraud pathway detection results. In this way, voice stress or frequency responses may be utilized to build other databases related to other types of fraud detection, thereby enhancing one or more aspects of fraud detection. For example, a database may include a voice library, a pathway library, or a frequency library which include characteristics associated with fraudulent activity, thereby facilitating identification of such activity. | 09-24-2015 |
20150269942 | ENHANCED FRAUD DETECTION - Embodiments of techniques or systems for fraud detection are provided herein. A communication may be received where the communication includes one or more voice signals from an individual. Frequency responses associated with these voice signals may be determined and analyzed and utilized to determine whether or not potential fraudulent activity is occurring. For example, if a frequency response is greater than a frequency threshold, potential fraudulent activity may be determined. Further, frequency responses may be cross referenced with voice biometrics, voice printing, or fraud pathway detection results. In this way, voice stress or frequency responses may be utilized to build other databases related to other types of fraud detection, thereby enhancing one or more aspects of fraud detection. For example, a database may include a voice library, a pathway library, or a frequency library which include characteristics associated with fraudulent activity, thereby facilitating identification of such activity. | 09-24-2015 |
20150269941 | FRAUD DETECTION - Embodiments of techniques or systems for fraud detection are provided herein. A communication may be received where the communication includes one or more voice signals from an individual. Frequency responses associated with these voice signals may be determined and analyzed and utilized to determine whether or not potential fraudulent activity is occurring. For example, if a frequency response is greater than a frequency threshold, potential fraudulent activity may be determined. Further, frequency responses may be cross referenced with voice biometrics, voice printing, or fraud pathway detection results. In this way, voice stress or frequency responses may be utilized to build other databases related to other types of fraud detection, thereby enhancing one or more aspects of fraud detection. For example, a database may include a voice library, a pathway library, or a frequency library which include characteristics associated with fraudulent activity, thereby facilitating identification of such activity. | 09-24-2015 |
20150188919 | OPERATIONAL SUPPORT FOR NETWORK INFRASTRUCTURES - Systems and methods that facilitate operational support for network infrastructures are discussed. The disclosed system and method facilitate a unified view of the current state of the network and networked devices including real-time log monitoring and for providing metrics for long term system planning. One such method can include the acts of automatically discovering a device deployed on a network, receiving device and network related data in real-time, determining whether a device is authorized, terminating device network access, filtering device data, validating device configuration, configuring a device and providing an output for use by a user. The disclosed system and method can be utilized, for example, to reduce the time involved in troubleshooting and resolving network issues, for establishing a baseline for network performance and for network capacity planning. | 07-02-2015 |
20150135328 | VEHICLE INTERFACE - One or more embodiments of techniques or systems for intelligent data presentation are provided herein. Data can be presented on similar devices having different characteristics in different manners. For example, data may be rendered in a first manner on a first device having one monitor, the same data may be rendered in a second manner on a second device having two displays or a different display size. Financial information, sales data, banking information, etc. may be presented in a variety of ways based on capabilities or properties of a device accessing the information or data. Similarly, renderings may be selected based on interaction capabilities or interaction options a user may have with different renderings or presentations. In other embodiments, user interaction with an automated teller machine (ATM), call center, vehicle, or other interface can be based on device properties or device capabilities. | 05-14-2015 |
20150135101 | FUNCTION BASED INTERFACE - One or more embodiments of techniques or systems for intelligent data presentation are provided herein. Data can be presented on similar devices having different characteristics in different manners. For example, data may be rendered in a first manner on a first device having one monitor, the same data may be rendered in a second manner on a second device having two displays or a different display size. Financial information, sales data, banking information, etc. may be presented in a variety of ways based on capabilities or properties of a device accessing the information or data. Similarly, renderings may be selected based on interaction capabilities or interaction options a user may have with different renderings or presentations. In other embodiments, user interaction with an automated teller machine (ATM), call center, vehicle, or other interface can be based on device properties or device capabilities. | 05-14-2015 |
20150135067 | INTELLIGENT DATA PRESENTATION - One or more embodiments of techniques or systems for intelligent data presentation are provided herein. Data can be presented on similar devices having different characteristics in different manners. For example, data may be rendered in a first manner on a first device having one monitor, the same data may be rendered in a second manner on a second device having two displays or a different display size. Financial information, sales data, banking information, etc. may be presented in a variety of ways based on capabilities or properties of a device accessing the information or data. Similarly, renderings may be selected based on interaction capabilities or interaction options a user may have with different renderings or presentations. In other embodiments, user interaction with an automated teller machine (ATM), call center, vehicle, or other interface can be based on device properties or device capabilities. | 05-14-2015 |
20150134675 | CONTEXT ASSOCIATION - One or more embodiments of techniques or systems for search context association are provided herein. Search context association can include search filtering and/or search expansion. For example, when a query is submitted, data or data sets can be filtered to narrow a search or expanded such that additional data sets or queries are included. Data or data sets can be aggregated, filtered, or expanded based on a context of the query. A context can include user characteristics, environmental factors, social media factors, route based characteristics, or destination based characteristics. As an example, when a new product (e.g., a new mobile phone) is released, limited quantities may be available. Users may be directed to different retailers or stores based on inventory levels, length of lines (which may be determined using social media among other things), distance, and the like. | 05-14-2015 |
20150134430 | AUTOMATED TELLER MACHINE (ATM) INTERFACE - One or more embodiments of techniques or systems for intelligent data presentation are provided herein. Data can be presented on similar devices having different characteristics in different manners. For example, data may be rendered in a first manner on a first device having one monitor, the same data may be rendered in a second manner on a second device having two displays or a different display size. Financial information, sales data, banking information, etc. may be presented in a variety of ways based on capabilities or properties of a device accessing the information or data. Similarly, renderings may be selected based on interaction capabilities or interaction options a user may have with different renderings or presentations. In other embodiments, user interaction with an automated teller machine (ATM), call center, vehicle, or other interface can be based on device properties or device capabilities. | 05-14-2015 |
20150131794 | CALL CENTER INTERFACE - One or more embodiments of techniques or systems for intelligent data presentation are provided herein. Data can be presented on similar devices having different characteristics in different manners. For example, data may be rendered in a first manner on a first device having one monitor, the same data may be rendered in a second manner on a second device having two displays or a different display size. Financial information, sales data, banking information, etc. may be presented in a variety of ways based on capabilities or properties of a device accessing the information or data. Similarly, renderings may be selected based on interaction capabilities or interaction options a user may have with different renderings or presentations. In other embodiments, user interaction with an automated teller machine (ATM), call center, vehicle, or other interface can be based on device properties or device capabilities. | 05-14-2015 |
20150130811 | BANKING INTERFACE - One or more embodiments of techniques or systems for intelligent data presentation are provided herein. Data can be presented on similar devices having different characteristics in different manners. For example, data may be rendered in a first manner on a first device having one monitor, the same data may be rendered in a second manner on a second device having two displays or a different display size. Financial information, sales data, banking information, etc. may be presented in a variety of ways based on capabilities or properties of a device accessing the information or data. Similarly, renderings may be selected based on interaction capabilities or interaction options a user may have with different renderings or presentations. In other embodiments, user interaction with an automated teller machine (ATM), call center, vehicle, or other interface can be based on device properties or device capabilities. | 05-14-2015 |
20150046984 | DYNAMIC AUTHENTICATION IN ALTERNATE OPERATING ENVIRONMENT - Systems and methods that employ dynamic credentials across distinct authentication standards can be used to reduce the burden associated with repeated re-authentication. A utility can be employed during logon in an alternate operating environment that stores information from the logon dynamically and generates a credential file that is employed to grant access to a resource without repeating the earlier logon procedure, even if the device changes its user state. After processes requiring resource access are complete, or when an allowed time expires, the granted access is revoked and the device returns to a default or standard authentication technique. | 02-12-2015 |
20140337946 | PASSWORD RESET SYSTEM - A customer initiated password reset system resets user passwords on a variety of network entities, such as internal systems, allowing simultaneous reset with a minimum number of user specified passwords that nonetheless satisfy the password specifications of these internal systems. Thereby, the user avoids the tedium of logging into each of these systems, changing their password, logging out, etc., for each system with the likelihood of creating unique passwords for each system that have to be remembered. By further incorporating a score metric based upon how many character sets are touched, a required degree of complexity can be measured and enforced against the password specifications. Advantageously, a table-based approach to enforcing password reset against the multiple password specifications facilitates making and fielding updates. | 11-13-2014 |
20140315159 | Banking Services Experience Center - A system for creating an interactive banking experience includes: a facility for housing the interactive banking experience; a first electronic computing device for controlling the interactive banking experience, the interactive banking experience comprising one or more banking workflow scenarios; an environmental control system for creating ambient conditions corresponding to the one or more banking workflow scenarios; and a detection system for detecting gestures and voice commands from a user, the gestures and voice commands being used to activate workflow steps in the one or more banking workflow scenarios. | 10-23-2014 |
20140310180 | MOBILE DEVICE CREDIT ACCOUNT - Providing for a mobile communication device (MCD) credit account and credit transactions by way of such an MCD is described herein. As an example, a credit account sponsored by a financial or commercial entity can be associated with a unique ID of an MCD. The MCD can interface with another electronic device and initiate credit transactions, such as commercial purchases, credit transfers, currency conversions, and the like, via the interface. Further, rules provided by the sponsoring entity can guide such transactions, enforcing credit limits, for instance. A management component can then synchronize transactions conducted by the device with a server of a financial institution over a remote communication interface, such as the Internet or a cellular/mobile communication network. Accordingly, a mobile device can replace a traditional credit card in transacting credit business. | 10-16-2014 |
20140207655 | MULTIPLE LOAN PAYMENT OPTION SALES TOOL - A multiple option loan presentation apparatus and method allows a loan agent to communicate a non-traditional loan product to a customer. Non-traditional mortgage products such as pick-a-payment loans allow a borrower to exchange lower payments during an initial period for higher payments layer in an amortization period. Some borrowers do not want to accept the risk associated with adjustable rate mortgages (ARMs) for increases in interest rates, but are still desirous of options for reduced monthly payments. Combining fixed rate loans with an option for interest-only or minimum payments allows this flexibility, but places a premium on being able to graphically depict the implications of these choices. Thereby, the borrower can make an informed decision and the loan agent may more quickly conclude the transaction. In particular, the minimum payments constraints and changes in amounts can be made more intuitive. | 07-24-2014 |
20140195307 | STRATEGIC PLANNING MANAGEMENT - An information technology (IT) strategic management system (and corresponding methodology) that enhances efficiency and effectiveness of IT planning processes and projects is provided. In particular aspects, the systems commence with a review of current IT state and strategy influencers. The state is analyzed to establish (or alternatively, to update) a strategy summary. The strategy summary can be presented for leadership approval and subsequently communicated to stakeholders for deployment. | 07-10-2014 |
20140172692 | FLEXIBLE AUTOMATIC SAVINGS PROGRAMS - Flexible automatic savings programs and/or processes are provided in which a consumer is presented with multiple options for automatic savings to be applied to transactions, such that savings amounts are transferred from a first account to a second account automatically for qualified accounts and transactions. A financial institution can assist the consumer select one of the options to apply to automatic transfers. Transfer policy can thus be customized for a consumer according to their savings needs and goals. Participation is limited to common, or overlapping, ownership status with respect to both source and target accounts, though other ownership entities can also be present. The way that savings amounts are determined for automatic transfers can also be dynamically customized to savings characteristics or goals of the consumer as those characteristics or goals change. | 06-19-2014 |
20130333002 | DYNAMIC AUTHENTICATION IN ALTERNATE OPERATING ENVIRONMENT - Systems and methods that employ dynamic credentials across distinct authentication standards can be used to reduce the burden associated with repeated re-authentication. A utility can be employed during logon in an alternate operating environment that stores information from the logon dynamically and generates a credential file that is employed to grant access to a resource without repeating the earlier logon procedure, even if the device changes its user state. After processes requiring resource access are complete, or when an allowed time expires, the granted access is revoked and the device returns to a default or standard authentication technique. | 12-12-2013 |
20130159053 | Capacity Management Index System and Method - A system and method is provided that generates an index, providing predictive and actionable intelligence to ensure that a Technology Infrastructure Group (TIG) makes tactical and strategic decisions in support of needs of customers. The invention measures overall health of an infrastructure, specifically with respect to how efficiently various services meet demand placed upon capacity by various Lines of Business. The invention provides an overall assessment of infrastructure capacity management and drills down to various services, components, subcomponents, etc. The invention provides a forecasting tool in which estimates made are not based only upon business forecasts provided by each Line of Business, but also upon forecasts developed by correlating external indicators with historical business volumes. Historical forecasts are compared to actual values to derive a confidence factor used for weighting future Line of Business forecasts. The combined, weighted forecasts obtained are more robust than any individual forecasts on their own. | 06-20-2013 |
20130151423 | VALUATION OF DATA - Systems and methods that provide for valuing data are discussed herein. These systems and methods can provide for determining an initial measure of value of the data asset and calculating a baseline monetary ratio based at least in part on the initial measure of value. Additionally, the innovation can include measuring one or more quality factors associated with the data asset, measuring a utility associated with the data asset, calculating a new measure of value of the data asset based at least in part on the baseline monetary ratio, the utility, and the one or more quality factors, and reporting the new measure of value. | 06-13-2013 |
20130036301 | Distributed Cryptographic Management for Computer Systems - A distributed cryptographic management system can include: a central key management service accessible through the network and having a database associated therewith; an approval module programed to receive approval for any client machines connectable to the network and applications associated with the client machines, the database storing records for the client machines, and a key management domain being defined by all approved client machines and applications; and an agent module programmed to provide key management agents, wherein the key management agents are transferable and installable on any of the approved client machines and applications within the key management domain. | 02-07-2013 |
20130018786 | ELECTRONIC BILL PAY AND BILL PRESENTMENT ACCOUNT NUMBER TREATMENT SYSTEM AND METHOD - A technique is provided that transforms account number data received from the consumer into one or more forms based on use by specific processes. Further provided is a technique for establishing payees using these account numbers such that remittances can be routed via the most cost effective means, e.g. which remittance processor is determined and/or which processor among internal processors within an enterprise is determined, and such that, when available, electronic bills can be successfully requested for on-line presentation. The technique to transform account number data can be applied by systems in industries other than banking and for account numbers from sources other than a customer. | 01-17-2013 |
20130013514 | CUSTOMER CONTROLLED ACCOUNT, SYSTEM, AND PROCESS - Access devices like credit cards and/or check cards have enhanced security features that allow a customer to control circumstances under which their account is accessed. Fraudsters may try to access the account without the knowledge of the consumer set controls, the system takes remedial action with reduced instances of false positives. An account is established for an account holder through a central entity, e.g. an issuer. At least one user is associated with the access device that is established for one or more transactions. Use of the access devices is defined by a set of rules defined by the central entity and are controllable by the customer, including comprising any of the account holder and the user of the account. The customer inputs, controls, and/or updates parameters associated with the customer-controllable rules. Subsequent authorization of the access devices is controlled based on the customer input and other controls. | 01-10-2013 |
20130013497 | GLOBAL REMITTANCE PLATFORM - The invention provides a remittance platform in which an enterprise, such as Wells Fargo, serves as a remittance transfer agent, where the remittance function is integrated with a bank. The invention allows access to the remittance program by both account holders with the enterprise and persons who do not have an account with the enterprise. The person accessing the service may pick the remittance service they want and the country they want. However, the service is not anchored to a particular account and can therefore work with both bank partners and non-bank partners and account holders and non-account holders. Further, the system may be private-labeled. Additionally, the invention provides a mechanism that allows one to send money easily to other countries and it allows bank partners to participate in the program easily as well. This is possible because the enterprise provides all of the processing in an integrated fashion. | 01-10-2013 |
20130013469 | SYSTEM AND METHOD FOR DATA MANAGEMENT AND FINANCIAL TRANSACTION CATEGORIZATION - A transaction management system includes a database system configured to receive and store data for a plurality of financial transactions, the data for the plurality of financial transactions being associated with a plurality of financial accounts of a user. The system further includes a server system coupled to the database system and configured to categorize the plurality of financial transactions into a plurality of categories, the categories including merchant categories and payment method categories, the server system being further configured to provide a plurality of user interfaces to the user, each user interface providing a display of a different portion of the plurality of financial transactions, each user interface configured to enable a user to select a link configured to direct the user to an image of a check associated with one of the plurality of financial transactions; and categorize the financial transaction into a one of the merchant categories. | 01-10-2013 |
20120226615 | CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented. | 09-06-2012 |
20120179911 | CRYPTOGRAPHIC KEY BACKUP AND ESCROW SYSTEM - A system for securely storing application keys is comprised of a database system, a peripheral hardware security module and cryptographic keys, wherein cryptographic keys comprise application keys, intermediate keys and a master key. Application keys are grouped according to characteristic and are associated with a particular intermediate key, which is utilized to scramble and descramble application keys within the associated group. Intermediate keys are associated with the master key, which is utilized to scramble and descramble the intermediate keys. Scrambling and descrambling of keys is performed within the peripheral hardware security module. | 07-12-2012 |
20110238992 | APPLICATION CONTROLLED ENCRYPTION OF WEB BROWSER CACHED DATA - A browser cache-securing component facilitates online communication of confidential data, such as for financial information, purchasing transactions, or user identification. Caching webpages for subsequent presentation enhances user productivity and efficiency while reducing burdens on network resources. Yet, the security risks of intrusions into cache memory are mitigated by retaining encrypted data in cache memory without prior decryption. A modest overhead in decrypting when and if the webpage is to be presented again gains a security and privacy advantage without taking away functionality. Decrypted versions of confidential data can thereby be relegated to volatile memory. Upon termination of a session, a session key shared by a network server is deleted, preventing subsequent decryption. Executing the browser cache-securing component in a virtual machine environment allows multiple browser types to benefit from the security feature. | 09-29-2011 |
20110196781 | MULTIPLE LOAN PAYMENT OPTION SALES TOOL - A multiple option loan presentation apparatus and method allows a loan agent to communicate a non-traditional loan product to a customer. Non-traditional mortgage products such as pick-a-payment loans allow a borrower to exchange lower payments during an initial period for higher payments layer in an amortization period. Some borrowers do not want to accepting the risk associated with adjustable rate mortgages (ARMs) for increases in interest rates, but are still desirous of options for reduced monthly payments. Combining fixed rate loans with an option for interest-only or minimum payments allows this flexibility, but places a premium on being able to graphically depict the implications of these choices. Thereby, the borrower can make an informed decision and the loan agent is able to more quickly conclude the transaction. In particular, the minimum payments constraints and changes in amounts can be made more intuitive. | 08-11-2011 |
20110066552 | CARD-LESS FINANCIAL TRANSACTION - Systems (and corresponding methodologies) that facilitate card-less financial transactions are provided. The innovation enables card-less ATM (automated teller machine) transactions such as cash withdrawals, transfers, balance inquiries, etc. In aspects, customers can set up an ‘electronic wallet’ account based upon a pre-set range or otherwise. Accordingly, access to the ‘electronic wallet’ is granted or denied based upon responses to challenges presented. | 03-17-2011 |
20110058673 | PUBLIC KEY ENCRYPTION FOR GROUPS - A system is comprised of a user and a group, wherein the group is comprised of a group leader and a group of M members where M is equal to or greater than one. The group leader generates a group public key and a group leader “master” private key. The group leader creates a personalized watermarked or decryption key, also referred to as an individual private key, for each group member. The individual private key uniquely identifies each group member. The group leader distributes the individual private keys to each of the group members. Each group member receives from a user a message encrypted using the group public key. Each of the group members uses its individual private key to decrypt the encrypted message sent by the user to the group. | 03-10-2011 |
20100145835 | MOBILE DEVICE CREDIT ACCOUNT - Providing for a mobile communication device (MCD) credit account and credit transactions by way of such an MCD is described herein. As an example, a credit account sponsored by a financial or commercial entity can be associated with a unique ID of an MCD. The MCD can interface with another electronic device and initiate credit transactions, such as commercial purchases, credit transfers, currency conversions, and the like, via the interface. Further, rules provided by the sponsoring entity can guide such transactions, enforcing credit limits, for instance. A management component can then synchronize transactions conducted by the device with a server of a financial institution over a remote communication interface, such as the Internet or a cellular/mobile communication network. Accordingly, a mobile device can replace a traditional credit card in transacting credit business. | 06-10-2010 |
20100017859 | Authentication system for networked computer applications - A system such as in a networked computer system comprising a user, an application server, a gatekeeper server and an authentication server. Communication within the system is managed by the gatekeeper server, wherein the user communicates with the authentication server and the application server through the gatekeeper server. Once the user has been initially authenticated by the authentication server, the user may request application services from a plurality of application servers within the networked computer system without having to be re-authenticated. | 01-21-2010 |