Follow us on Twitter
twitter icon@FreshPatents


Validation patents

      

This page is updated frequently with new Validation-related patent applications.




 Method, system and  enhancing security of beacon device patent thumbnailMethod, system and enhancing security of beacon device
A method, system and apparatus for enhancing the security of a beacon device are herein disclosed. A service device includes a service communication unit and a service control unit.
Sk Planet Co., Ltd.


 Method, system and  enhancing security of beacon device patent thumbnailMethod, system and enhancing security of beacon device
A method, system and apparatus for enhancing the security of a beacon device are herein disclosed. A service device includes a service communication unit and a service control unit.
Sk Planet Co., Ltd.


 Systems and methods for securing command and data interfaces to sensors and devices through the use of a protected security zone patent thumbnailSystems and methods for securing command and data interfaces to sensors and devices through the use of a protected security zone
Various embodiments of the invention increase security of a network of interoperable devices. In certain embodiments, this is accomplished by a security module that is uses a user-definable security policy that sets forth one or more tests for validating input data or commands received from an iot device.
Dell Products L.p.


 Design validation using natural language processing patent thumbnailDesign validation using natural language processing
Aspects of the present disclosure relate to systems and methods that help automate the validation of a configuration of a functional product. Every functional product, be it a service, device, or combination thereof, has one or more documents associated with it.
Dell Products L.p.


 System and methods for interdependent identity based credential collection validation patent thumbnailSystem and methods for interdependent identity based credential collection validation
A system for digitally verifying credential sets and its method of use are provided. A credentials set is made up of a number of credentials, each linked to a particular entity.
Accreditrust Technologies, Llc


 Systems and methods for installation of a remotely monitored vending network patent thumbnailSystems and methods for installation of a remotely monitored vending network
An embodiment provides a system of automated workflow management and active checkpoint validation that streamlines and standardizes the vending machine provisioning process. The embodiment not only normalizes the installation and deployment process across geographic and personnel differences, it also greatly optimizes the process allowing for increased installations per technician per day.
Vendwatch Telematics, Llc


 System and methods for secure firmware validation patent thumbnailSystem and methods for secure firmware validation
An electronic device, such as a dynamic transaction card having an emv chip, that acts as a tpm having a memory, an applet, and a cryptographic coprocessor performs secure firmware and/or software updates, and performs firmware and/or software validation for firmware and/or software that is stored on the electronic device. Validation may compare a calculated checksum with a checksum stored in emv chip memory.
Capital One Services, Llc.


 Constraint validation process patent thumbnailConstraint validation process
The present disclosure relates to a system and method for constraint validation in an electronic design. The method may include receiving an electronic design at an electronic design automation application and analyzing at least a portion of the electronic design at a constraint validation tool configured to analyze one or more physical constraints in a design layout associated with the electronic design.
Cadence Design Systems, Inc.


 Restriction of validation to active tracks in non-volatile storage during a warmstart recovery patent thumbnailRestriction of validation to active tracks in non-volatile storage during a warmstart recovery
A storage system, maintains a cache and a non-volatile storage. Active tracks in the non-volatile storage are determined.
International Business Machines Corporation


 Method for preventing reference invalidation when reversing operations in synchronous collaborative applications patent thumbnailMethod for preventing reference invalidation when reversing operations in synchronous collaborative applications
A computer-implemented method for preventing reference invalidation when reversing operations in synchronous collaborative applications may include (i) storing, on a client, a shared model of an engineering object including one or more features, (ii) receiving, from a user, an operation to be performed on the feature, (iii) before performing the operation, storing, in a command stack on the client, information sufficient to restore the feature to a state prior to performing the operation, (iv) receiving, from the user, a request to reverse the operation, (v) determining whether reversing the operation will create an invalid reference due to a conflicting operation having been performed on the feature at a second client, and (vi) in response to determining whether reversing the operation will create an invalid reference, reversing the operation or performing a resolution operation to prevent the reference invalidation. A system corresponding to the above method is also disclosed..
Brigham Young University


Portable electronic device

A portable electronic device includes: a housing that is configured to be held by one hand of a human being; a holding detection unit that detects holding of the housing by the one hand; an input operation detection unit that detects an input operation; and a control section that outputs a control signal based on detection results of the holding detection unit and the input operation detection unit. The control section validates the input operation detection unit if the holding of the housing is detected by the holding detection unit, and after the validation, outputs a control signal based on a detection result of the input operation detection unit regardless of the detection result of the holding detection unit..
Omron Automotive Electronics Co., Ltd.

Battery test system for predicting battery test results

A method of predicting battery test results includes using a battery test computer to predict a battery test result for a battery undergoing testing. The battery test computer comprises a tangible, non-transitory computer-readable medium storing a battery test management system implemented as one or more sets of instructions.
Johnson Controls Technology Company

System and managing certificate based secure network access with a certificate having a buffer period prior to expiration

Provided is a system and method for managing certificate based secure network access based on a buffer period prior to the expiration of the certificate. The system includes an authentication hardware system structured and arranged to receive from a user by way of a first device having at least one processor, a request for certificate based network access, the request including a certificate having a lifespan incorporating a buffer period.
Cloudpath Networks, Inc.

System and managing network access with a certificate having soft expiration

Provided is a system and method for managing network access with a certificate having soft expiration. The system includes an authentication system structured and arranged to receive from a user by way of a first device having at least one processor, a request for certificate based network access, the request including a certificate having a soft expiration date.
Cloudpath Networks, Inc.

Process and system for selectable data transmission

Methods and systems are provided for selectable data transmissions. An electronic key may be assigned to authenticated data associated with a particular user, electronic data may be encrypted, using at least part of the electronic key, to generate encrypted data, and a program code that must be executed to decrypt the encrypted data may be incorporating into the encrypted data.
Swisscom Ag

Network testing device for automated topology validation

A network testing device is provided in order to validate network topology information and test various other attributes of a network. The network testing device may, in response to a command, obtain connection information from a network indicated in the command.
Amazon Technologies, Inc.

System and loan validation and recovery system for marketplace investors

The process and system as described herein provides for unique tracking and validation processes that may enable investors in loans originated through online or marketplace lending platforms to access independent validation of account information for each loan in a portfolio of loans at origination and on an ad hoc basis after origination.. .
Gdr Acquisition Company Llc

Coupon registration and validation system

In an illustrative system and method for disbursing resources includes (i) receiving a user request for a coupon, the user request including user criteria; (2) matching the received user criteria with a target audience criteria; (3) transmitting a coupon to a user, the coupon including a unique password based upon a match of the received user criteria and the target audience criteria; (4) receiving a request for registration of the unique password of the coupon with the user; (5) receiving a request for validation of the unique password of the coupon; and (6) authorizing the user to access the network resource associated with the coupon upon validation of the unique password.. .
Vtu De Colombia S.a.

Electronic payment validation and authorization system

A system for performing electronic payment validation and authorization wherein a user of an electronic device transmits transaction data to an electronic payment validation and authorization system. The same user of the electronic device may nearly simultaneously transmit a cryptographic hash of transaction data to a merchant who uses a payment processing system to process the transactions.
Aerius, Inc.

Verification of fraudulent activities at a self-checkout terminal

A verification method of a fraudulent activity taking place at a self-checkout terminal is disclosed. The method verifies the fraudulent activity by confirming an incident of the fraudulent activity with multiple data generated by monitoring the transaction area and the bagging area of the self-checkout terminal.
Stoplift, Inc.

Method and system for providing secure access and data storage to mobile computing devices

Described herein are method and system for providing secure access and data storage to mobile computing devices utilizing wireless connection. A personal data storage device stores and provides identity tag and owner's data.

Blockchain system for natural language processing

A blockchain configured system includes a router and a blockchain configured record bank. The router collects data and converts it in a format in accordance with a defined standard.
Netspective Communications Llc

Method and system for checking natural language in proof models of modal logic

A system for checking natural language in proof models of modal logic includes parsing natural language for parts of speech mapping (posm) into logical symbols and expressions, then proving the logical expression in the logic model checker (lcm) by modal logic. The lcm is applied to computer program validation and requirement document verification..
Ersatz Systems Machine Cognition, Llc

Systems and methods for registering devices in a wireless network

A wireless sensor network is disclosed. A content management system (cms) communicates with a gateway over a network connection.
Nebulae Llc

Managing access to content for a sponsored data campaign

A device may receive a network address and a signature. The network address may be associated with a sponsored data campaign, and the signature may be generated based on a security key and based on the network address.
Verizon Patent And Licensing Inc.

Auditable retrieval of privileged credentials

In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (pim) system, a processor invokes a checkout of a pim credential, based on, at least, a determination that a pim server cannot be accessed. A processor receives a request to access the pim credential by a user.
International Business Machines Corporation

Wrist worn rfid device with security protection and method thereof

A wrist worn rfid device with security protection includes a wrist worn body, a control circuit, a sensing circuit, a safety circuit, a rfid module and a processing circuit. When the control circuit detects that two connecting ends of the control circuit are electrically conducted due to two combined portions of the wrist worn body are fastened together, an enable signal is generated.
Mitac Computing Technology Corporation

Auditable retrieval of privileged credentials

In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (pim) system, a processor invokes a checkout of a pim credential, based on, at least, a determination that a pim server cannot be accessed. A processor receives a request to access the pim credential by a user.
International Business Machines Corporation

System and privacy-aware information extraction and validation

Disclosed herein is a system to validate information about a user, or users, derived from publicly-accessible data. The system comprises a validation system that uses private data about the user to validate the user information derived from the publicly-accessible data.
Yahoo! Inc.

Process security validation

Techniques for process security validation are described herein. In one example, a method includes determining, via a processor, that a process is in a first idle state based at least in part on system activity and process activity being below an activity threshold.
International Business Machines Corporation

System component failure diagnosis

System component failure diagnosis is provided. In response to determining that a number of component failure cases corresponding to a complex system stored in a historical diagnosis database is less than a pre-defined threshold number of component failure cases, a system component failure root cause is predicted using a rule-based reasoning method.
International Business Machines Corporation

Risk-appropriate validation for live operating system migration

Methods for migrating a virtual machine instance between devices include scoring a received migration request against one or more rules in a rule database relating to one or more respective validation sets. Each validation set includes one or more validation subtasks.
International Business Machines Corporation

Risk-appropriate validation for live operating system migration

Methods and systems for migrating a virtual machine instance between devices include scoring a received migration request against one or more rules in a rule database relating to one or more respective validation sets. Each validation set includes one or more validation subtasks.
International Business Machines Corporation

Cross-validation based code feature tagging

Method and systems for tagging code include building a code structure based description unit association model (cdam) that associates code units with respective description units and organizes the code units in a hierarchical structure. The cdam is filtered to remove un-meaningful description units through cross-validation between code units.
International Business Machines Corporation

Method and system for dynamically producing color validation patches

An image forming apparatus, a method, and a computer readable medium are disclosed for generating color patches for color validation of a print engine of an image forming apparatus. The method includes acquiring a validation result on a first color validation chart with a sensing device, the sensing device configured to read a color validation chart, the color validation chart having one or more color patches, and wherein the validation result compares a color accuracy of each of the one or more color patches from the first color validation chart to a target color; and determining an order of each of the color patches in a second color validation chart to be printed based on the validation result on the first color validation chart, wherein the order of the color patches in the second color validation chart is determined based on color patches that do not match the target color..
Konica Minolta Laboratory U.s.a., Inc.

Certifying a website

In a method for certifying a website to be malware-free and owned by an entity fulfilling a trust criterion, such as a chartered financial institution, a request can be received via a network. The request can specify a domain name and a site map of the domain name.
Ncr Corporation

Enhanced evpn mac route advertisement having mac (l2) level authentication, security and policy control

Techniques are described that enable mac (l2) address authentication within an l2 switching network, such as a metro transport network. Moreover, when used in an evpn, the techniques provide fine grain policy control over the l2 switching network so as to enable carrier networks to specify and control topologies for transporting packet-based communications.
Juniper Networks, Inc.

Network-attached storage gateway validation

An indication to validate operation of a network-attached storage gateway is received. The network-attached storage gateway communicatively couples a client and an object store.
Netapp, Inc.

Manipulation and restoration of authentication challenge parameters in network authentication procedures

A challenge manipulation and restoration capability is provided for use during network authentication. A mobile device (md) and a subscriber server (ss) each have provisioned therein a binding key (b-key) that is associated with a subscriber identity of a network authentication module (nam) of the md.
Alcatel Lucent

Virtual ticket-in and ticket-out on a gaming machine

An electronic gaming machine includes a cabinet, a display mounted to the cabinet, a wireless interface for communicating with a portable electronic device, a network interface for communicating with a validation server, a bill validator coupled to a game controller configured to accept bills and printed ticket vouchers, and a removable cash box. The game controller includes a processor and a memory configured to control a wager-based game played on the egm, redeem virtual ticket vouchers and printed ticket vouchers, receive an indication to transfer value to the egm via a virtual ticket voucher, receive the virtual ticket voucher including a virtual ticket voucher validation number from the portable electronic device via the wireless interface, validate the virtual ticket voucher with the validation server via the network interface, deposit a credit amount associated with the virtual ticket voucher, and notify the validation server that the virtual ticket voucher is redeemed..
Igt

Method and system for dynamic pin authorisation for atm or pos transactions

A computer-implemented method is proposed for otp authorisation for atm or pos transactions. The method comprises: a) storing in a database a reference code for an otp application installed on a user device and details for one or more of the user's payment cards in association with the reference code; b) receiving, along with payment card details, an otp generated by the application and entered by the user into an atm or pos terminal; c) validating the otp; and d) on successful validation, authorising a payment transaction from the payment card..
Mastercard International Incorporated

Systems and methods for providing centralized and community-based management of three-dimensional printable files

Systems and methods are provided for tracking processing of three-dimensional (3d) files. The system receives a request to obtain a three-dimensional file from a three-dimensional file repository.

Device-driven non-intermediated blockchain system over a social integrity network

A blockchain configured device-driven disintermediated distributed system for facilitating multi-faceted communication over a network. The system includes entities connected with a communications network.
Netspective Communications Llc

Data migration validation

A system for validating data migrated from a first data store with source data to a second data store for destination data. A comparator is configured to access entity data for a particular entity which has been migrated from a first data store to a second data store.
Microsoft Technology Licensing, Llc

Data access control based on storage validation

A system and method to control access to data are disclosed. A command to mount a specified file system as a trusted file system is received.
Blackberry Limited

Small cell self-validation and provisioning without using backhaul

Small cell provisioning and validation may be performed, for small cells, in a small cell cluster, based on wireless cellular network connections (i.e., without requiring the use of a backhaul connection). In some implementations, the small cells may communicate with one another using direct device-to-device (d2d) communications.
Verizon Patent And Licensing Inc.

Validation of audio calibration using multi-dimensional motion check

Examples described herein involve validating motion of a microphone during calibration of a playback device. An example implementation involves receiving motion data indicating movement of a recording device while the recording device was recording a calibration sound emitted by one or more playback devices in a given environment during a calibration period.
Sonos, Inc.

Device, system, and scheduled avail tone validation

An avail comparator and method validates scheduled avail tones. The method includes receiving an automation playlist indicating at least one scheduled avail tone configured to be included in a broadcast.
Viacom International Inc.

Cross access login controller

Systems and methods here may be used for authorizing network access including using by a server computer with a processor and memory, for receiving, through the gateway support node, a request to access the first network associated with the gateway support node from a client device, wherein the request includes a client device identifier, sending a validation request of the client device identifier to the data storage server, receiving a validation response based on previously registered client device identifier information and previously registered credential information from a second network, from the data storage server and sending authorization approval to the gateway support node for the client device access request to the first network.. .
Ruckus Wireless, Inc.

Systems and methods for secure one-time password validation

A system may generate a seed one-time password (otp). The system may also perform steps including transmitting the seed otp to a user device, receiving a response otp from the user device, and calculating an expected response otp by applying a function to the seed otp.
American Express Travel Related Services Company, Inc.

Method of security and verifiability of an electronic vote

A method of security and verifiability of an electronic vote, comprising reception of a temporary voting ballot, during which a temporary voting ballot is received by a voting entity, the temporary voting ballot being encrypted by a public voting encryption key; reception of a validation voting ballot, during which a validation voting ballot is received from the voting entity, the validation voting ballot being encrypted by a public validation encryption key; decrypting the validation voting ballot by a private validation key associated with the public validation encryption key; validating a validation request generated from the decrypted validation voting ballot sent to the voting entity; the preceding steps being repeated until the acceptance of the validation request by the voting entity, after which the encrypted temporary voting ballot is registered as a definitive voting ballot awaiting its counting.. .
Election-europe



Validation topics:
  • Validation
  • Access Point
  • Process Control
  • Access Control
  • Scalability
  • Thermostable
  • Spongiform
  • Encephalopathy
  • Spongiform Encephalopathy
  • Provisioning
  • Activation Request
  • Femtocells
  • Privileges
  • Automation
  • Business Model


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Validation for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Validation with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.6079

    file did exist - 2445

    1 - 1 - 53