Follow us on Twitter
twitter icon@FreshPatents


Validation patents

      

This page is updated frequently with new Validation-related patent applications.




 Limiting mobile device functionality in a vehicle patent thumbnailLimiting mobile device functionality in a vehicle
A method, device and system for limiting mobile device functionality in a vehicle. When a vehicle is in motion, a motion detector initiates a signal generator, which transmits a disabling signal that is received and processed by software residing on a mobile device.
Cbros Technologies, Llc


 Automatically validating enterprise firewall rules and provisioning firewall rules in computer systems patent thumbnailAutomatically validating enterprise firewall rules and provisioning firewall rules in computer systems
Automatically validating a firewall rule for provisioning in a computer system. One or more firewall rules for provisioning on a server is received from a user device.
International Business Machines Corporation


 System for domain control validation patent thumbnailSystem for domain control validation
A system and method for domain control validation is presented. At a certificate authority a request is received.
Go Daddy Operating Company, Llc


 Techniques for yang model version control validation patent thumbnailTechniques for yang model version control validation
In one embodiment, a method is provided for using a server computer, creating and storing a first module name, a first indication of a first version, and a first signature for a first data model that is digitally stored in a digital electronic data storage unit; receiving a second data model from the data storage unit and identifying a second module name in the second data model; comparing the second module name of the second data model to the first module name of the first data model; determining that the first module name and the second module name comprise a same name, and in response thereto, identifying a second indication of a second version from a revision field of the second data model; using the server computer, comparing the second indication of the second version from the second data model to the first indication of the first version of the first data model; determining the first indication and the second indication indicate the same version, determining a second signature for the second data model; comparing the second signature for the second data model with the first signature for the first data model; determining from the comparison that the second signature and the first signature are different, and in response thereto, creating and storing a flag value in main memory of the server computer and specifying that the second data model is different.. .
Cisco Technology, Inc.


 Efficient hardware trust verification in data communication systems that comprise network interface cards, central processing units, and data memory buffers patent thumbnailEfficient hardware trust verification in data communication systems that comprise network interface cards, central processing units, and data memory buffers
In a data communication network, network interface cards (nics) receive user data and interrupt central processing units (cpus) that then transfer buffer descriptors for the user data to data memory buffers (dmbs). The dmbs receive the buffer descriptors from the cpus and transfer the buffer descriptors to the nics.
Sprint Communications Company L.p.


 Set top box with sharing of external hard disk drive patent thumbnailSet top box with sharing of external hard disk drive
An audio/video content management apparatus, for use with an external hard drive, includes a control circuit that performs a trust token generation operation. The trust token generation operation includes obtaining first identification information and hard drive identification information, encrypting and combining the first identification information and the hard drive identification information as a trust token, and sending the trust token to the external hard drive.
Arris Enterprises, Inc.


 Modification and validation of spatial data patent thumbnailModification and validation of spatial data
A method for validating data changes made to a database is disclosed. The changes are made in the context of a transaction, and validation is performed using a rules database storing a plurality of rules.
1spatial Group Limited


 System and  adaptable fabric consistency validation and issue mitigation in an information handling system patent thumbnailSystem and adaptable fabric consistency validation and issue mitigation in an information handling system
A method performed by an information handling system, the method including detecting that a first device has been connected to the information handling system (ihs). The method further including in response to detecting that the first device has been connected, updating one or more fabric consistency validation rules of the ihs associated with the first device and one or more other devices that are connected to the first device by one or more links, and validating that the first device is compatible with each of the other devices based on the updated fabric consistency validation rules of the ihs..
Dell Products, Lp


 Capacitive sensing apparatus and methods patent thumbnailCapacitive sensing apparatus and methods
One or more waveform generators impose an input waveform across touch sensor components. Phase shift detection logic measures a phase shift between the input waveform and an output waveform component associated with each waveform generator appearing across a touch sensor component.
Texas Instruments Deutschland Gmbh


 Media distribution and management platform patent thumbnailMedia distribution and management platform
An embodiment of the invention simplifies management of the “video lifecycle”. An embodiment includes one of more modules that streamline the video publishing process by abstracting technical steps such as video publishing, updating video, unpublishing video, retrieval or statistics concerning video, authorization to process video, validation of video, video metadata processing, video transcoding, and/or video transmission.
Ustudio, Inc.


Leveraging security as a service for cloud-based file sharing

A method of leveraging security-as-a-service for cloud-based file sharing includes receiving, at a cloud-based file sharing server external to an enterprise network and having connectivity to the enterprise network, instructions from an enterprise network to validate a file uploaded by a first user associated with the enterprise network before allowing the file to be downloaded. The file sharing server may then receive the file from the first user and forward the file to a cloud-based security-as-a-service (secaas) server that is also external to the enterprise network and has connectivity to the enterprise network.
Cisco Technology, Inc.

Access control policy management in a cloud services environment

In an example, a method of managing access to resources managed by heterogeneous resource servers having different policy document formats in a cloud services environment includes obtaining, at an identity and access management (iam) service, a policy document describing privileges of an end user with respect to accessing at least one resource of the resources managed by a resource server of the heterogeneous resource servers; sending the policy document from the iam service to an resource server endpoint designated by the resource server for validation; storing, by the iam service, the policy document in a datastore in response to a determination by the resource server endpoint that the policy document is valid; and generating, by the iam service, an indication that the policy document is invalid in response to a determination by the resource server endpoint that the policy document is invalid.. .
Vmware, Inc.

Systems and methods for automatically securing and validating multi-server electronic communications over a plurality of networks

This disclosure relates to methods and systems for automatically securing and validating multi-server electronic communications over a plurality of networks, without requiring additional physical or programmatic infrastructure on the intermediary servers. A processor-executable component can be transmitted from a first server to a compute device, where it generates a pair of asymmetric cryptographic parameters.
Pay With Privacy, Inc.

Switch controller with validation circuit for improved noise immunity

A switch controller for controlling a power switch includes a signal transformer to galvanically isolate a primary side from a secondary side and receive and transfer a transition signal to transition the power switch to an on or off state between the primary side and the secondary side. The transition signal pulses to a first value to indicate the power switch transitions to the on state, to a second value to indicate the power switch transitions to the off state, and remains at a third value when there is no transition.
Ct-concept Technologie Gmbh

System and validating natural language content using crowdsourced validation jobs

Systems and methods of validating transcriptions of natural language content using crowdsourced validation jobs are provided herein. In various implementations, a transcription pair comprising natural language content and text corresponding to a transcription of the natural language content may be gathered.
Voicebox Technologies Corporation

Invalidation data area for cache

The present disclosure relates to caches, methods, and systems for using an invalidation data area. The cache can include a journal configured for tracking data blocks, and an invalidation data area configured for tracking invalidated data blocks associated with the data blocks tracked in the journal.
Hgst Netherlands B.v.

Systems and methods for data validation and processing using metadata

A system receives a source and a metadata layer that describes the source. The source may comprise source records with fields containing source data, and the metadata layer may include metadata comprising at least one of a field data type, a field data length, a field description, or a record length.
American Express Travel Related Services Co., Inc.

Hardware-trusted orthogonal frequency division multiplex (ofdm) access to a shared common public radio interface (cpri)

An orthogonal frequency division multiplex (ofdm) data communication system has an access subsystem that exchanges user data with an access network. The ofdm system has a trusted subsystem that exchanges user data with a trusted network.
Sprint Communications Company L.p.

Validating resource identifiers being registered for a toll-free data campaign

A device may receive registration information for a toll-free data campaign. The toll-free data campaign may allow a content provider to pay costs of network data usage by user devices that access content associated with the toll-free data campaign.
Verizon Patent And Licensing Inc.

Predicting account takeover tsunami using dump quakes

Methods, systems, and computer program products for predicting an account takeover tsunami using dump quakes are disclosed. A computer-implemented method may include analyzing activity for a plurality of user accounts based on detecting an abnormal increase in system activity, determining the abnormal increase in the system activity is associated with account validation attacks performed by an unauthorized party, identifying attributes of a plurality of user accounts associated with the account validation attacks, searching online locations using the identified attributes of the user accounts to find a data breach source, monitoring the online locations periodically based on the identified attributes of the user accounts to detect future publication of a dump of private user data, sending a notification to another organization in advance of the publication of the dump of private user data to allow the other organization to adjust security of one or more other systems in advance..
Paypal, Inc.

Method and system for enhanced validation of cryptograms in cloud-based systems

A method for enhanced validation of cryptograms for varying account number lengths includes: storing one or more primary account numbers and a plurality of formatting templates, each template being associated with an account number length; receiving a selection indicating a specific primary account number; identifying a specific formatting template where the associated account number length corresponds to a length of the specific primary account number; receiving an unpredictable number from a point of sale device; generating a cryptogram based on at least the unpredictable number and one or more algorithms; generating a data string, wherein the data string includes at least the generated cryptogram, the specific primary account number, and the unpredictable number, and wherein the data string is formatted based on the identified specific formatting template; and electronically transmitting the generated data string to the point of sale device.. .
Mastercard International Incorporated

Certificate validation and channel binding

A constrained network entity may determine, via an authentication procedure with a core network entity, the trustworthiness of an endpoint attempting to establish a secure channel with the constrained network entity. The constrained network entity may receive a certificate from the endpoint attempting to establish the secure channel and the constrained network entity may send the certificate asserted by the endpoint to a core network entity for validation.
Interdigital Patent Holdings, Inc.

Method of managing student arrival and student dismissal

A method of managing student arrival and student dismissal is executed within a remote server as the remote server is communicably coupled with at least one automobile identification (ai) device. The ai device scans an incoming vehicle in order to identify at least one authorized profile.

Parking meter payment system

The parking meter payment system is a device adapted to interface with a parking meter that automates the payment of parking fees. The parking meter payment system comprises a transponder, a meter module, and a smart phone application.

System and a self-calculating token vault

A system and method for electronic payment that involves generating and then using a temporary token based on a legacy pan (primary account number) to conduct an electronic transaction. The token is generated by transforming the pan using specific inputs such that the original pan can be recovered by manipulating the token in various ways as disclosed herein.
Sequent Software, Inc.

Side-channel integrity validation of devices

Techniques are presented herein that validate integrity of a computing device. A command to a first processor of a security module of the computing device is received through an interface unit of the security module on a communication channel external to the computing device.
Cisco Technology, Inc.

Method and system for validation of an online profile

A method for validating user-submitted profile data includes: receiving, by a receiving device, profile data and a user identifier from a first entity, wherein the profile data and the user identifier are associated with a user and where the profile data includes a plurality of unverified data values; transmitting, by a transmitting device, at least the user identifier to a second entity; receiving, by the receiving device, a plurality of corresponding data values from the second entity; and validating, by a processing device, at least one unverified data value of the plurality of unverified data values based on a correspondence to a corresponding data value of the plurality of corresponding data values.. .
Mastercard International Incorporated

Intelligent data munging

According to examples, intelligent data munging may include ascertaining data that is to be transformed, and determining, based on an analysis of the ascertained data, a sample of the ascertained data. Intelligent data munging may further include enriching the sample of the ascertained data, determining features of the enriched sample of the ascertained data, and determining, based on the features, a transformation to be applied to the enriched sample of the ascertained data to transform the enriched sample of the ascertained data from a first format to a second format.
Accenture Global Solutions Limited

Flexible i/o dma address allocation in virtualized systems

An i/o dma address may be translated for a flexible number of entries in a translation validation table (tvt) for a partitionable endpoint number, when a particular entry in the tvt is accessed based on the partitionable endpoint number. A presence of an extended mode bit can be detected in a particular tvt entry.
International Business Machines Corporation

Supporting invalidation commands for non-volatile memory

Techniques and systems are provided for tracking commands. Such methods and systems can include maintaining a meta page in a volatile memory to track commands.
Sk Hynix Inc.

Flexible i/o dma address allocation in virtualized systems

An i/o dma address may be translated for a flexible number of entries in a translation validation table (tvt) for a partitionable endpoint number, when a particular entry in the tvt is accessed based on the partitionable endpoint number. A presence of an extended mode bit can be detected in a particular tvt entry.
International Business Machines Corporation

Program lifecycle testing

In one embodiment, a system for program lifecycle testing includes receiving a request to test a program update at an interface. Using a processor, the system may then execute a validation test associated with the program update, wherein the validation test is conducted in a testing environment comprising a plurality of testing environment systems.
Bank Of America Corporation

Method and system for managing performance of instrumentation devices

The present disclosure relates to a method for managing performance of at least one instrumentation device deployed across one or more sites. The method comprises receiving instrument data from the at least one instrumentation device.
Wipro Limited

Persistent checksum data validation

Examples relate to persistent checksum data validation. In some examples, it is determined if a storage array supports a persistent checksum capability.
Hewlett-packard Development Company, L.p.

Safe secure bit storage with validation

A bit storage device, integrated circuit, and method are provided. The bit storage device comprises registers to store an actual value, an inverse value, a differential actual value, and a differential inverse value, a validation circuit including validation inputs coupled to outputs of the registers and including a validity output to provide a validity indication, and a write circuit including write circuit inputs coupled to the registers, the write circuit configured to cause, at a first clock edge, the first register to store the actual value and either the second register to store the inverse value or the fourth register to store the differential inverse value, and, at a second clock edge, the third register to store the differential actual value and the other of the second register and the fourth register to store to store the inverse value or the differential inverse value, respectively..
Freescale Semiconductor, Inc.

Software and associated hardware regression and compatiblity testing system

The present disclosure describes testing regression and compatibility of software and associated hardware. Embodiments herein disclosed receive an indication from a user to test the regression and the compatibility of proposed software; access software files related to installation of the proposed software; present a verification interface to the user, wherein the verification interface includes various validation functions for validating entries created or updated along with the proposed software being installed or uninstalled, such as a registry entry, a log file entry, an add or remove programs entry, and the like, wherein when each of the validation functions is selected, the system automatically determines if the corresponding entry for installation or uninstallation of the proposed software is successful.
Bank Of America Corporation

Systems and methods for stabilizer control

A method, apparatus, system and computer program is provided for controlling an electric power system, including implementation of a voltage control and conservation (vcc) system used to optimally control the independent voltage and capacitor banks using a linear optimization methodology to minimize the losses in the eedcs and the eus. An energy validation process system (evp) is provided which is used to document the savings of the vcc and an epp is used to optimize improvements to the eedcs for continuously improving the energy losses in the eeds.
Dominion Resources, Inc.

System and automatically generating cad field sketches and automatic validation thereof

A method for automatically validating measurements of a field survey including providing, on a field computing device, a two-dimensional image of a field to be surveyed, providing actual coordinates of at least two field reference points, each corresponding to an image reference point on the two-dimensional image, employing the field computing device to outline, on the two-dimensional image, features of interest of the field, employing the field computing device to manually select, on the outline, a plurality of image measuring points, for each image measuring point, identifying a corresponding field measuring point, measuring the actual coordinates of each field measuring point, thereby obtaining actual coordinates thereof, and responsive to the obtaining, automatically ascertaining for each image measuring point and corresponding field measuring point, whether there is a discrepancy between the location of the image measuring point on the two-dimensional image and the actual coordinates of the corresponding field measuring point.. .
Datumate Ltd.

Automated well test validation

A diagnostic apparatus configured to communicate with a well test system comprising a plurality of wells in a field, comprising a receiving component configured to receive a well test data from the well test system, a transmitting component configured to transmit an abnormal well test signal indication, at least one processor configured to communicate with the transmitting component and the receiving component, and a memory coupled to the at least one processor, wherein the memory comprises instructions that when executed by the at least one processor cause the diagnostic apparatus to compare the well test data to one or more well test descriptors stored in memory, correlate the well test data to an abnormal well test result selected based at least in part on the comparison with the one or more well test descriptors stored in the memory, and instruct the transmitting component to transmit an abnormal well test signal indication to a recipient.. .

Short range wireless translation methods and systems for hands-free fare validation

A system and method in which the bluetooth technology is used in conjunction with a user application on a mobile device to facilitate hands-free fare validation at a transit station. The user app communicates with a controller driver in a controller unit that interfaces with a compliant fare gate.
Bytemark, Inc.

Aeronautical message monitor

A system includes a transmitting line replaceable unit (tlru) configured to receive messages including instructions for avionics receiving line replaceable units (rlrus). The system further includes a memory configured to store validation data including a set of expected messages.
The Boeing Company

Deep network validation of configuration inputs for a network-dependent system

A method for validating configuration inputs for a computing device dependent on a network, including: accessing a validated portion of input, wherein the validated portion of input is consistent with information internal to the computing device; determining if a content of the validated portion of input is sufficient to enable a network validation determination to be performed, thereby achieving a positive network probe determination or a negative network probe determination; based on the positive network probe determination, querying an external network to determine if the external network includes a configuration enabling a functioning of the computing device therein, wherein the external network is external to the computing device; and based on the querying, generating a network validation determination, wherein the network validation determination includes a determination as to whether or not the external network includes a configuration enabling a functioning of the computing device therein.. .
Vmware, Inc.

Resolving configuration errors through recommendations

A method for suggesting network values for configuration parameters, associated with a computing device, that fail validation processes, including: accessing a negative validation, wherein the negative validation signifies that the network configuration parameters, of input, are found to be inconsistent with known network configuration parameters; comparing at least the negative validation with the input and a set of rules to achieve comparison results, wherein the set of rules comprises network configuration information associated with a network, network configuration information associated with the computing device and a predetermined listing of expected formats and expected content of the input; comparing the comparison results with a recommendation table, and based on the comparing the comparison results with the recommendation table, generating a recommendation.. .
Vmware, Inc.

Systems methods and devices for brain health assessment

Methods and systems are provided in relation to a brain assessment system. A system is provided, comprising: an interface server that hosts a client site or application for establishing a communication interface connection to one or more client devices to receives test-taker identification information and an electronic indication of consent to collection of test data, and send a software and device request signal to check for software and device compatibility, wherein the interface server generates and transmits a test-taker token and a session id token after validation of the test-taker identification information; a test server for a brain assessment tool that receives the test-taker token and a session id token and after validation generates an electronic brain testing instance for a client device to compute brain testing results, the electronic testing instance having a test ticket identifier token for the session id; the interface server monitoring input components of the client device to detect test response times for the electronic testing instance; the interface server tuning the test response times and the brain testing results based on the software and device compatibility and processing times; the test server computing a test report based on normalization of the brain testing results to provide a score relative to adults of similar gender, education, and age; and one or more data storage devices to store the brain testing results, the test ticket identifier token, the session id, and the test-taker identification information..
Cogniciti Inc.

Automated transit validation rule updating

Techniques are disclosed for automatically determining and implementing fare validation rules based on analysis of rejected transactions from one or more fare validators. In some embodiments, a server or other monitoring system can monitor rejected transactions, determine a common characteristic among all the rejected transactions, and create a validation rule change that would permit the use of fare media having the common characteristic.
Cubic Corporation

Device and checking the integrity of physical objects

The invention relates to a device for monitoring physical objects that comprises one or more short-range remote readers, memory elements to be attached to physical objects, and a controller adapted for executing a reading function capable of interaction with the one or more remote readers in order to acquire data contained in adjacent memory elements, and for executing an integrity validation function capable of distinguishing, from the acquired data, individual identifiers particular to each of the memory elements as well as group description data stored in at least some of said memory elements, and of checking the sufficiency of group description data while checking the compliance of individual identifiers with corresponding group description data.. .
Inria Institut National De Recherche En Informatique Et En Automatique

Validation of internet address input to a device

In one aspect, a device includes a processor, a display accessible to the processor, and storage accessible to the processor that bears instructions executable by the processor to receive input comprising a uniform resource locator (url), and in response to receipt of the input, at least attempt to validate the url at least in part using a daemon. The instructions are also executable to, based at least in part on the attempt, provide an indication on a display of whether the url is valid..
Lenovo (singapore) Pte. Ltd.

Computer implemented automatically deploying and versioning scripts in a computing environment

Embodiments herein describe computer implemented methods and systems for automatically deploying and versioning scripts in a computing environment. One embodiment includes validating a plurality of scripts associated with an application stored in a repository server by executing the plurality of scripts in a first database, creating at least one patch file comprising at least one of the plurality of scripts upon successful validation of the plurality of scripts associated with the application, and automatically storing the at least one patch file in the repository server, where the at least one of the plurality of scripts are automatically versioned in the repository server.
Tata Consultancy Services Limited

Covalently linked thermostable kinase for decontamination process validation

A biological process indicator is provided for validating a treatment process in which the amount or activity of a contaminant in a sample is reduced. The indicator comprises a thermostable kinase covalently linked to a biological component, with the proviso that the biological component is not an antibody.
The Secretary Of State For Health

Twist lock diecast fastener assembly

A fastening system particularly adapted for joining automotive hardware components to body components, such as a window regulator module plate to the door inner panel. The system employs a joint element featuring twist in attachment and retention.
Hi-lex Controls, Inc.

Soldering station with automatic soldering connection validation

A soldering iron station and a method thereof for a soldering joint connection validation, the method including: identifying a type of the soldering cartridge being used; performing a preliminary validation by measuring the soldering tip temperature, after the soldering event has started; monitoring the power level delivered to the soldering tip to detect liquidus occurrence; determining the thickness of an intermetallic component (imc) of the soldering joint; determining whether the thickness of the imc is within a predetermined range, within a predetermined cooling time period; and indicating that a reliable soldering joint connection is formed, when the thickness of the imc is within the predetermined range, within the predetermined cooling time period.. .
Ok International Inc.



Validation topics:
  • Validation
  • Access Point
  • Process Control
  • Access Control
  • Scalability
  • Thermostable
  • Spongiform
  • Encephalopathy
  • Spongiform Encephalopathy
  • Provisioning
  • Activation Request
  • Femtocells
  • Privileges
  • Automation
  • Business Model


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Validation for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Validation with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.4249

    file did exist - 2343

    1 - 1 - 51