Wells Fargo Bank, N.A. (20240236093). APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION

Organization Name

Wells Fargo Bank, N.A.

Inventor(s)

Peter Bordow of Fountain Hills AZ (US)

Jeff J. Stapleton of O'Fallon MO (US)

Ramesh Yarlagadda of Charlotte NC (US)

APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240236093 titled 'APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR OFFLINE AUTHENTICATION

Simplified Explanation: The patent application describes a method, apparatus, and computer program product for offline authentication. The method involves receiving a request for authentication from a user device, determining the offline condition of the computing device, obtaining second authentication credentials, and authenticating the user based on a forecast operation.

Key Features and Innovation:

  • Method for offline authentication based on user attributes retrieved from a digital identity construct database.
  • Determination of offline condition of the computing device.
  • Authentication process involving first and second authentication credentials.
  • Forecast operation for user authentication.

Potential Applications: This technology can be applied in various industries such as banking, e-commerce, healthcare, and government services for secure offline authentication processes.

Problems Solved: This technology addresses the need for secure offline authentication methods that are based on user attributes and can adapt to changing conditions of the computing device.

Benefits:

  • Enhanced security for offline authentication processes.
  • Improved user experience with forecast-based authentication.
  • Adaptability to changing conditions for user verification.

Commercial Applications: The technology can be utilized by companies offering online services that require secure user authentication, such as financial institutions, e-commerce platforms, and government agencies.

Prior Art: Further research can be conducted in the field of offline authentication methods and the use of forecast operations for user verification.

Frequently Updated Research: Researchers may explore advancements in offline authentication technologies and the integration of artificial intelligence for more secure authentication processes.

Questions about Offline Authentication: 1. How does offline authentication differ from online authentication methods? Offline authentication involves verifying a user's identity without requiring a constant internet connection, while online authentication relies on real-time verification through internet connectivity.

2. What are the potential risks associated with offline authentication processes? Potential risks of offline authentication include data breaches, unauthorized access, and the possibility of user credentials being compromised if not securely stored and managed.


Original Abstract Submitted

a method, apparatus, and computer program product for offline authentication are provided. an example method includes receiving, by a computing device, a request for authentication from a first user device associated with a first user. the request includes first authentication credentials generated based upon user attributes retrieved by the first user device from a digital identity construct database at a first time. the method includes determining an offline condition of the computing device at a first time. the method also includes obtaining, by the computing device, second authentication credentials associated with the first user that are based upon one or more user attributes retrieved by the computing device from the digital identity construct database at a second time later than the first time. the method incudes determining a discrepancy between the first and second authentication credentials and authenticating the first user based upon a forecast operation of the same.