Images List Premium Download Classic

Validation

Validation-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Processing a security policy for certificate validation error
September 13, 2018 - N°20180262348

Disclosed herein are systems and methods for a security gateway to process secure network sessions where there is a server certificate validation error. In various embodiments, varying security policies can be applied to the secure network sessions, including intercepting of network data, bypass of the security gateway, or termination of the secure sessions..
Integration of verification tokens with mobile communication devices
September 13, 2018 - N°20180262334

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a usb connection so as to use the computer's networking facilities.
Training random decision trees for sensor data processing
September 13, 2018 - N°20180260531

A method of training a random decision tree to give improved generalization ability is described. At a split node of the random decision tree a plurality of training sensor data elements available at the split node are divided into a tuning set and a validation set.
Validation Patent Pack
Download 518+ patent application PDFs
Validation Patent Applications
Download 518+ Validation-related PDFs
For professional research & prior art discovery
inventor
  • 518+ full patent PDF documents of Validation-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Enhanced policy editor with completion support and on demand validation
September 13, 2018 - N°20180260300

In an approach to providing completion support and on demand validation in a web tool that operates on live resources, one or more computer processors create one or more lists of content, where the one or more lists of content include one or more references to one or more runtime objects. The one or more computer processors parse the one ...
Blockchain version control systems
September 13, 2018 - N°20180260212

Distributed version control systems, methods, and computer-readable media are described. A computer system may implement a version control blockchain system by obtaining source code and/or an artifact associated with source code.
Engineered methodology for design verification and validation of ultra-deep high pressure high temperature oil and ...
September 13, 2018 - N°20180256964

A process for the verification and validation testing of equipment and components for drilling, completion, production and general well construction (typically such as subsurface safety valves, wellhead trees, blowout preventers and wireline pressure control equipment) to determine the suitability of such equipment for use in oil and gas wells in high pressure high temperature environments. In particular, the process of ...
Validation Patent Pack
Download 518+ patent application PDFs
Validation Patent Applications
Download 518+ Validation-related PDFs
For professional research & prior art discovery
inventor
  • 518+ full patent PDF documents of Validation-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Preventing unauthorized access to secured information systems using authentication tokens
Bank Of America Corporation
September 06, 2018 - N°20180255052

Aspects of the disclosure relate to providing information security and preventing unauthorized access to secured resources by implementing token-based authentication techniques. A computing platform may receive, from a client computing device, a request to authenticate a user to a user account associated with a client portal provided by a client portal server.
Apparatus and method for predictive token validation
Futurewei Technologies, Inc.
September 06, 2018 - N°20180255040

An apparatus and method are provided for predictive token validation. In use, a database stores service usage information relating to usage of at least one service hosted by at least one server.
Software validation for untrusted computing systems
Hewlett Packard Enterprise Develpment Lp
September 06, 2018 - N°20180254906

A method of validating software including maintaining, in a trusted computing system, a copy of at least portions of data of the software, the software comprising data in an untrusted computing system. The method includes, with the trusted computing system, specifying selected data from data included in the copy as hash data, generating an executable file for generating a hash ...
System and method for incident validation and ranking using human and non-human data sources
International Business Machines Corporation
September 06, 2018 - N°20180253814

Systems and associated methods are provided that aggregated data from a variety of sources, the data pertaining to an incident. The aggregated data is analyzed and the credibility of the incident report is determined.
System and method for incident validation and ranking using human and non-human data sources
International Business Machines Corporation
September 06, 2018 - N°20180253813

Systems and associated methods are provided that aggregated data from a variety of sources, the data pertaining to an incident. The aggregated data is analyzed and the credibility of the incident report is determined.
Method and system for storage and transfer of verified data via blockchain
Mastercard International Incorporated
September 06, 2018 - N°20180253464

A method for verified data storage via blockchain includes: storing a blockchain comprised of a plurality of blocks, each comprised of a block header and a plurality of transaction values, the block header including a timestamp; receiving a transaction notification including an entity identifier and data values; validating the data values based on a validation notification received from a verifying ...
System and method for testing a device using a light weight device validation protocol
Wipro Limited
September 06, 2018 - N°20180253364

This disclosure relates generally to device testing, and more particularly to a system and method for testing a device using a light weight device validation (lwdv) protocol. In one embodiment, a method is provided for testing the device.
Validation Patent Pack
Download 518+ patent application PDFs
Validation Patent Applications
Download 518+ Validation-related PDFs
For professional research & prior art discovery
inventor
  • 518+ full patent PDF documents of Validation-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and apparatus for enabling machine to machine communication
Interdigital Patent Holdings, Inc.
August 23, 2018 - N°20180242129

A method and apparatus for performing secure machine-to-machine (m2m) provisioning and communication is disclosed. In particular a temporary private identifier, or provisional connectivity identification (pcid), for uniquely identifying machine-to-machine equipment (m2me) is also disclosed.
Push-based cache invalidation notification
Facebook, Inc.
August 23, 2018 - N°20180241801

In one embodiments, one or more first computing devices receive updated values for user data associated with a plurality of users; and for each of the user data for which an updated value has been received, determine one or more second systems that each have subscribed to be notified when the value of the user datum is updated and each ...
Single packet authorization in a cloud computing environment
At&t Intellectual Property I, L.p.
August 23, 2018 - N°20180241718

Concepts and technologies disclosed herein are directed to single packet authorization (“spa”) in a cloud computing environment. A compute node can include a virtual switch operating on at least a portion of a plurality of hardware resources of a cloud computing environment, a virtual firewall, a cloud workload executing a cloud service, and a spa service.
Systems and methods for network topology validation
Dell Products L.p.
August 23, 2018 - N°20180241631

An information handling system may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the processor to determine a topology of connectivity of various components of a system comprising multiple information handling system chassis and apply validation rules to the topology to validate the topology.. .
Proximity-based security
Digital Kerosene Inc.
August 23, 2018 - N°20180241577

In one embodiment, a first computing device may establish a spatial gap, wherein the spatial gap is defined by a maximum distance from the first computing device for computing devices requesting validation of credentials. The first computing device may then exchange with a second computing device, data transmissions to execute a handshake protocol, wherein the first computing device transmits communication ...
Identifying a pathway for condition of assembly validation
The Boeing Company
August 23, 2018 - N°20180240227

A method and apparatus for establishing a pathway for performing an automated validation of a condition of assembly. A sensor system coupled to an automated guided vehicle is moved into test positions relative to the structure.
Automated validation of condition of assembly
The Boeing Company
August 23, 2018 - N°20180240226

A method and apparatus for performing an automated validation of a condition of assembly for a structure. A plurality of images of the structure are registered to a computer model of the structure in which an image in the plurality of images captures a portion of the structure.
Modeling consumer activity
August 23, 2018 - N°20180240136

For modeling consumer activity, a plurality of processor computational resources generates potential model types. In addition, the plurality of processor computational resources divides activity data into a training data set, a test data set, and a validation data set.
Loading