FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Assertion topics
Social Networking
Social Network
Networking
Machine Learning
Repository
Clock Divider
High Speed
Graphics Processing Unit
Interactive
Breakpoint
Concurrent
Concurrency
Expressions
Deasserted
Storage Device

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Assertion patents



      
           
This page is updated frequently with new Assertion-related patent applications. Subscribe to the Assertion RSS feed to automatically get the update: related Assertion RSS feeds. RSS updates for this page: Assertion RSS RSS


Dynamic generation of policy enforcement rules and actions from policy attachment semantics

Policy assertion linking to processing rule contexts for policy enforcement

Dynamic generation of policy enforcement rules and actions from policy attachment semantics

Date/App# patent app List of recent Assertion-related patents
08/14/14
20140229755
 Pulse width modulation load share bus patent thumbnailPulse width modulation load share bus
Power supply modules have outputs coupled in parallel and convey load share balancing information over a single wire load share bus. Pulse width modulation (pwm) signals represent output loading of each of the power supply modules over the single wire load share bus.
08/14/14
20140229596
 Dynamic generation of policy enforcement rules and actions from policy attachment semantics patent thumbnailDynamic generation of policy enforcement rules and actions from policy attachment semantics
At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.
08/14/14
20140229595
 Policy assertion linking to processing rule contexts for policy enforcement patent thumbnailPolicy assertion linking to processing rule contexts for policy enforcement
A selectable policy enforcement mode of a policy enforcement point (pep) is configured that, based upon a selected policy enforcement mode, selectively modifies an input message processing context. The selectively modified input message processing context is used to invoke policy enforcement rules from multiple policy domains to implement one of independent policy enforcement and sequential cascaded policy enforcement of the policy enforcement rules from the multiple policy domains.
08/14/14
20140229593
 Dynamic generation of policy enforcement rules and actions from policy attachment semantics patent thumbnailDynamic generation of policy enforcement rules and actions from policy attachment semantics
At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.
08/07/14
20140223059
 Write transaction interpretation for interrupt assertion patent thumbnailWrite transaction interpretation for interrupt assertion
A method and circuit for a data processing system (12) provide a virtualized programmable interrupt control system (70) which processes interrupt event reports from interrupt sources (e.g., 14, 40) which generate write transactions to an address for an interrupt event register (80) which is authenticated and then interpreted based on the current state of the targeted interrupt to generate the next state using an interpretation table (306) and predetermined configuration/state bits (310-314).. .
07/31/14
20140215578
 Adaptive audiences for claims in a social networking system patent thumbnailAdaptive audiences for claims in a social networking system
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.
07/24/14
20140208431
 Automated tools for building secure software programs patent thumbnailAutomated tools for building secure software programs
A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify application-specific security properties, for a computer software program. An assertion checker module can automatically analyze the computer software program to ensure that it satisfies the application-specific security properties.
07/24/14
20140208149
 Apparatus and method for dynamically aligned source synchronous receiver patent thumbnailApparatus and method for dynamically aligned source synchronous receiver
An apparatus including a synchronous lag receiver that receives one of a plurality of radially distributed strobes and a data bit, and that delays registering of the data bit by a propagation time. The synchronous lag receiver has a first plurality of matched inverters, a first mux, and a bit receiver.
07/24/14
20140208148
 Automatic source synchronous bus signal alignment compensation mechanism patent thumbnailAutomatic source synchronous bus signal alignment compensation mechanism
An apparatus including a joint test action group (jtag) interface and a bit lag control element. The jtag interface receives information that indicates an amount to adjust a propagation time.
07/24/14
20140208147
 Apparatus and method for locally optimizing source synchronous data strobes patent thumbnailApparatus and method for locally optimizing source synchronous data strobes
An apparatus is provided that compensates for misalignment on a synchronous data bus. The apparatus includes a bit lag control element and a synchronous lag receiver.
07/24/14
20140207766
Assertion quality assessment and management system
An assertion assessment system is presented. An assertion object that represents a relationship between an assertion and an information source can be bound to a quality measure as an indication of the quality of the assertion object.
07/24/14
20140207735
Apparatus and method for dynamic alignment of source synchronous bus signals
An apparatus that compensates for misalignment on a synchronous data bus. The apparatus includes a replica distribution network, a bit lag control element, and a synchronous lag receiver.
07/24/14
20140204691
Source synchronous bus signal alignment compensation mechanism
An apparatus having a bit lag control element that measures a propagation time beginning with assertion of a first signal and ending with assertion of a second signal, and that generates a first value indicating an adjusted propagation time. The control element includes delay lock control, adjust logic, and a gray encoder.
07/17/14
20140201809
Characteristics of security associations
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a wtru, may request access to a service controlled by an access control entity (ace).
07/17/14
20140201083
System and method for offering a multi-partner delegated platform
A system and method for offering a delegated platform that includes configuring a partner key of a partner record on a service platform with a partner; creating an account scoped within the partner record; receiving a session authentication request that specifies a partner assertion of a partner authenticated session request of the account; authenticating the session authentication request with the partner key; and rendering an embeddable account portal with a session of the account.. .
07/10/14
20140195539
System and method for automatically generating systematic reviews of a scientific field
A system and method are provided for automatically generating systematic reviews of received information in a field of science and technology, such as scientific literature, where the systematic review includes a systematic review of a research field in the scientific literature. The method includes the steps of constructing a time series networks of words, passages, documents, and citations and/or co-citations within received information into a synthesized network, decomposing the networks into clusters of fields or topics, performing part-of-speech tagging of text within the received information to provide tagged text, constructing semantic structures of concepts and/or assertions extracted from the source text, generating citation-based and content-based summaries of the clusters of fields or topics and the semantic structures, and generating structured narratives of the clusters of fields or topics and the summaries of the generated semantic structures.
07/03/14
20140189827
System and method for scoping a user identity assertion to collaborative devices
A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion enables the devices to access an application system.
06/26/14
20140181925
Privacy enhanced key management for a web service provider using a converged security engine
In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.
06/19/14
20140172732
Psychographic based methods and systems for job seeking
A computer-implemented method for job seeking is disclosed. The method includes receiving a user request to search job openings, which request includes desired work field and user education information.
06/12/14
20140165139
Security language translations with logic resolution
Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs.
06/12/14
20140164843
System, method and computer program product for debugging an assertion
In accordance with embodiments, there are provided mechanisms and methods for debugging an assertion. These mechanisms and methods for debugging an assertion can enable improved interpretation and analysis of data validation results, more efficient development associated with data validation, etc..
06/12/14
20140164661
Methods and systems for time keeping in a data processing system
Data processing systems with interrupts and methods for operating such data processing systems and machine readable media for causing such methods and containing executable program instructions. In one embodiment, an exemplary data processing system includes a processing system, an interrupt controller coupled to the processing system and a timer circuit which is coupled to the interrupt controller.
06/05/14
20140156437
System and method for generating a narrative summary
A method and system for automatically generating a self-updating naturally-reading narrative product summary including assertions about a selected product. In one embodiment, the system and method includes evaluating an existing narrative product summary, comparing an existing attribute name, attribute value, attribute unit, and assertion model, respectively, to a current attribute name, attribute value, attribute unit, and assertion model to determine if one of the comparisons shows a change.
05/29/14
20140149439
Dfa-nfa hybrid
Disclosed is a hybrid architecture combining dfa and nfa based engines. The dfa engine and nfa engine scan the same input stream.
05/29/14
20140147081
Connector systems having receptacle assembly and plug assembly
A data center connector (dcc) system includes a receptacle connector assembly that includes a receptacle body having a plug receiving end, a panel assertion end and a plug receiving chamber at the plug receiving end that receives a plug body of a plug connector assembly. A receptacle ferrule is located in the receptacle body.
05/29/14
20140145699
Systems and methods for controlling power in semiconductor circuits
A power control circuit includes a plurality of transistors coupled between a power supply node and a gated power supply node, wherein the gate electrode of a first transistor of the plurality of transistors is coupled to receive a power control signal, wherein, in response to assertion of the power control signal, the first transistor is placed into a conductive state; a first voltage comparator, wherein, in response to assertion of the power control signal, places a second transistor of the plurality of transistors in a conductive state when a voltage on the gated voltage supply node reaches a first reference voltage; and a second voltage comparator, wherein, in response to assertion of the power control signal, places a third transistor of the plurality of transistors in a conductive state when the voltage on the gated voltage supply node reaches a second reference voltage different from the first reference voltage.. .
05/08/14
20140129592
Build pooled data source based on hana saml login
A system receives a request from a request processor of a database connection pool to access a database. The system determines whether a database connection from the database connection pool is available for the request.
05/08/14
20140125381
Voltage-aware signal path synchronization
An integrated circuit (ic) generates clock delay control signals based on its operational voltage level. The clock delay control signals are routed to corresponding clock gating logic that controls the synchronous capturing of the outputs of corresponding signal paths.
05/01/14
20140123264
Domain based authentication scheme
In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the uri of an initial or primary internet network call. Thereafter, the system can enable the owner of the first domain to make assertions or statements about additional domains and uris that make up the rest of the web page, session or application..
04/24/14
20140114949
Knowledge management system
A system includes a memory operable to store an ontology and a search index. The system also includes a data agent operable to generate a knowledge assertion by parsing one or more data elements retrieved from a data source.
04/24/14
20140114903
Knowledge management engine for a knowledge management system
A system includes a memory operable to store an ontology. The ontology includes a plurality of instances, and a plurality of relationships between the instances.
04/24/14
20140114902
Intelligent data agent for a knowledge management system
A system includes a memory operable to store one or more classification rules. The system also includes a processor communicatively coupled to the memory.
04/10/14
20140101743
Method for authenticating a user to a service of a service provider
Methods, devices, and computer programs for an authentication of a user to a service of a service provider are disclosed. Access for the user to the service of the service provider is requested.
04/10/14
20140101679
Secure transfer of credit card information
A method includes receiving, at a video service provider system, a security markup assertion language (saml) token encrypted for a partner federated security token service (fsts) device from a client device. The method includes submitting the saml token to the partner fsts device in exchange for a partner saml token.
04/10/14
20140101640
White-box testing systems and/or methods for use in connection with graphical user interfaces
Certain example embodiments relate to white-box testing techniques, e.g., for graphical user interfaces (guis). A test case to be run on the application includes interactions between the application and external components that were gathered as the application ran and received user input from a user until a desired test state was reached, and assertions to be made to the application once that state is reached.
04/10/14
20140101629
Early design cycle optimzation
Some example embodiments include a computer-implemented method for designing an integrated circuit. The computer-implemented method includes receiving a hierarchical network design for the integrated circuit, wherein the hierarchical design comprises a number of components that are coupled together.
04/10/14
20140101352
Interrupt controller, apparatus including interrupt controller, and corresponding methods for processing interrupt request event(s) in system including processor(s)
An interrupt controller coupled to a plurality of processors is provided to rout at least one interrupt request event to at least one of the processors. The interrupt controller includes a receiving circuit and a controlling circuit.
03/27/14
20140090093
Mesh grid protection system
A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines.
03/27/14
20140084976
Delay-locked loop with dynamically biased charge pump
A delay-locked loop, including a phase detector configured to receive two signals, one of the signals being delayed relative to the other of the signals, the phase detector having an up output and a down output. The delay-locked loop also includes a charge pump system operatively coupled with the phase detector, the charge pump system including (1) a charge pump configured to be responsive to assertion of actuating signals from the up output and the down output so as to control pumping of charge from the charge pump system, such pumped charge being usable to control a delay line carrying one of the two signals, so as to control relative delay occurring between the two signals; and (2) a feedback control loop configured to dynamically adjust at least one bias signal at the charge pump so as to minimize net charge pumped from the charge pump system during simultaneous assertion of actuating signals from the up output and the down output..
03/20/14
20140082067
Sharing asserted media
Concepts and technologies are disclosed herein for sharing asserted media. An assertion application can be executed by a device to generate asserted media.
03/20/14
20140078072
Method and apparatus pertaining to the display and acceptance of predicted text
An electronic device is configured to display text as entered by a user and to provide predicted words in response to that entered text. The device displays only one of the predicted words on the display at a time, in-line with the text being entered by the user, to thereby provide an opportunity for the user to accept the one predicted word.
03/13/14
20140075540
Geographic filter for regulating inbound and outbound network communications
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security assertions are provided. Geographic information is collected, optimized, and shared between network objects to enforce network access control on the basis of configurable security assertions.
03/13/14
20140075421
Apparatus and method for generating assertion based on user program code, and apparatus and method for verifying processor using assertion
Exemplary embodiments disclose a method for generating an assertion based on a user program code. The method may include receiving a user program comprising at least one assertion directive, a compiled result of the user program, and architecture information of a processor, and generating, based on the compiled result of the user program and the architecture information of the processor, an assertion which states an operation that the processor needs to perform in accordance with a code of the user program indicated by each of the at least one assertion directive..
03/13/14
20140075188
Trusted third party client authentication
A method includes receiving, at a video service provider system, a request for an online video session from a third party device with a security markup assertion language (saml) token as an input, decrypting a saml assertion in the saml token with a private key associated with the video service provider system, validating the saml assertion based on a third party public key associated with the third party sts, and retrieving a third party account user identifier and a device type. The method also includes identifying a link time based on the third party account user identifier, identifying a password change time (pct) stamp associated with the service provider user account, and providing the online video session to the third party device in response to determining that the pct stamp is not later than the link time..
03/06/14
20140067408
Systems and methods for use in training medical treatments to healthcare professionals
A medical event information system includes at least one client computer, a memory area configured to store at least one property of an object, and a server system communicatively coupled to the client computer and the memory area. The memory area is configured to store data associated with a plurality of medical events, wherein each medical event resulted in a legal assertion being made by a patient following a surgical procedure.
02/13/14
20140047532
Secure mobile client with assertions for access to service provider applications
A software-as-a-service (saas) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more saas applications to access, and including an idp identifier for the saas application. The saas access control application includes software to be inserted into a network software stack of the client device and software configured to serve as an identity provider for assertions.
02/13/14
20140046647
Active trace assertion based verification system
A method is presented for responding to user input by displaying when a circuit has a property expressed by an assertion based on data indicating values of signals of the circuit at a succession of times. The assertion expresses the property as a first sequence of expressions, and separately defines for each expression a corresponding evaluation time relative to the succession of times at which the expression is to be evaluated.
02/13/14
20140046459
Achieving best effort performance with interfering communications system equipment
Primary and secondary apparatuses avoid concurrent performance of activities, wherein the secondary apparatus has a best and possibly different worst case minimum amounts of time required to perform activity. The primary apparatus ascertains a first future moment when it will become inactive and ascertains whether its upcoming period of inactivity will not be less than the secondary apparatus' best case minimum amount of time required to perform activity.
02/06/14
20140040865
System and method for using an abstract syntax tree to encapsulate the descriptive assertions in an annotation based standard into a code based library
A system and method can support compliance tests with annotation based standards using an expectation library. The expectation library can convert one or more descriptive assertions into a structured data model, wherein the one or more descriptive assertions describe one or more annotations.
02/06/14
20140040864
System and method for using a shared standard expectation computation library to implement compliance tests with annotation based standard
A system and method can implement compliance tests with annotation based standards using a model library. The model library encapsulates expectation computation logic described in one or more annotation based assertions.
02/06/14
20140040471
Systems and methods for enabling coexistence of multiple wireless components operating in the same frequency band
Methods and systems for enabling coexistence of multiple potentially interfering wireless components in a device are provided. A device may include a wireless module using a proprietary protocol and one or more modules using standardized protocols.
02/06/14
20140035648
Timer match dithering
A counter/timer circuit and a method of operating the counter/timer circuit are described. In one embodiment, a method of operating a counter/timer circuit involves determining a match condition by comparing a count value of the counter/timer circuit with a value stored in a match register of the counter/timer circuit and delaying an assertion of the match condition based on a value programmed in a match companion register of the counter/timer circuit.
01/30/14
20140033273
Automating calls between separate and distinct applications for invoking an identity verification function
A method, software and system allows for the novel and seamless integration between disparate hardware and software systems to facilitate strong authentication and identity assertion of an individual as an integral component of transaction processing. The method, software and system can combine quick response (qr) code(s) with more custom mobile device uniform resource locator (url) scheme(s) to seamlessly invoke mobile application(s) that enable an end user to perform strong, multi-factor authentication as a component of completing a transaction.
01/23/14
20140026120
Unit testing an enterprise javabeans (ejb) bean class
An approach for unit testing an enterprise javabeans® (ejb®) bean is presented. A test case for unit testing the ejb® bean is initiated.
01/16/14
20140019665
Optimized buffer placement based on timing and capacitance assertions
Optimized buffer placement is provided based on timing and capacitance assertions in a functional chip unit including a single source and multiple macros, each having a sink. Placement of the source and macros with the sinks is pre-designed and buffers are placed in branches connecting the source with the multiple sinks.
01/09/14
20140013241
System & method for online rating of electronic content
A system and method are provided for rating online electronic content. A compilation of information or other item of electronic content is presented to a user, along with comments.
01/02/14
20140007179
Identity risk score generation and implementation
Embodiments are directed to providing an identity risk score as part of an authentication assertion, applying operating heuristics to determine an operating application's validity and to providing identity risk scores to requesting third parties. In one scenario, an authentication server receives from a cloud service portal various user credentials from a user.
12/26/13
20130346324
System and method for specifying and processing legality expressions
A system and method are provided for specifying a legality expression for use in a system for processing the legality expression. The system and method include providing a legality expression language, including at least one of a duty element specifying an obligation that a principal must perform an act, a ban element specifying a prohibition that a principal must not perform an act, an intent element specifying an intention that a principal wants to perform an act, and a claim element specifying an assertion that a principal does perform an act.
12/26/13
20130344920
Method and apparatus pertaining to dynamically determining entered telephone numbers
As keys of the keyboard of a portable communication device are asserted, the device dynamically determines at least a portion of a corresponding telephone number to present on the device's display by, at least in part, considering likelihoods of differing explicit and implicit interpretations of these key assertions. By one approach this can comprise according a likelihood advantage to an explicit interpretation of one or more of the key assertions and/or implicit interpretations of such key assertions.
12/12/13
20130333003
Systems and methods for implementing multi-factor authentication
A computer-implemented method for implementing multi-factor authentication may include 1) receiving, as part of a secondary authentication system, an authentication request from a client system, 2) redirecting the client system to first perform a first authentication with a primary authentication system in response to receiving the authentication request, 3) receiving an assertion of the first authentication from the client system that demonstrates that the first authentication was successful, and 4) performing a second authentication with the client system in response to receiving the assertion of the first authentication. Various other methods, systems, and computer-readable media are also disclosed..
12/12/13
20130332821
Methods and systems for creating psychographic resumes
A computer-implemented method for creating psychographic resumes is disclosed. The method may include receiving a user request to create the psychographic resume in the form of an electronic document, and prompting the user to select at least one job role and to input one or more assertions associated with the selected job role.
12/05/13
20130326450
Early design cycle optimzation
Some example embodiments include a computer-implemented method for designing an integrated circuit. The computer-implemented method includes receiving a hierarchical network design for the integrated circuit, wherein the hierarchical design comprises a number of components that are coupled together.
11/28/13
20130317657
Drive vibration prevention system
A drive vibration prevention system includes a fan and a drive. The drive includes a vibration detection device and a vibration notification pin.
11/28/13
20130315014
Method and apparatus for memory access delay training
Various method and apparatus embodiments for training a delay for enabling a data strobe signal in a memory subsystem are disclosed. In one embodiment, a system includes a memory controller configured to receive a data strobe signal.
11/21/13
20130312115
Human-authorized trust service
A method for authorizing access to data within a system is disclosed herein. The method includes authenticating a first trusted user identity corresponding to a first individual and granting that first trusted user identity a trust assertion privilege.
11/07/13
20130297954
Host initiated state control of remote client in communications system
A system and method for low-cost, fault tolerant, emi robust data communications, particularly for an ev environment. A data communications method, including a) enabling a transmission of a wake signal from a host to a remote client through an isolator disposed at the remote client when the wake signal is asserted from the host at a host-portion of the isolator concurrent with a periodic enablement of a client-portion of the isolator by the remote client; and thereafter b) transmitting the wake signal from the host to the remote client through the isolator; c) controlling enablement of the client-portion responsive to the wake signal transmitted through the isolator; and thereafter d) disabling the transmission by deassertion of the wake signal at the host..
11/07/13
20130295858
System and method for synchronized triggering of test equipment for testing mimo transceivers
A system and method for testing multiple-input-multiple-output (mimo) devices under test (duts) with multiple radio frequency (rf) signal testers. Each tester receives one or more rf signals from one or more of the duts, and the testers are mutually coupled in a ring such that successive ones receive a trigger input signal from an upstream tester and provide a trigger output signal to a downstream tester.
10/24/13
20130282813
Collaborative management of contacts across multiple platforms
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.
10/24/13
20130282812
Adaptive audiences for claims in a social networking system
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.
10/24/13
20130282811
Providing a claims-based profile in a social networking system
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.
10/24/13
20130282810
Evaluating claims in a social networking system
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.
10/24/13
20130282504
Managing copyrights of content for sharing on a social networking system
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.


Popular terms: [SEARCH]

Assertion topics: Social Networking, Social Network, Networking, Machine Learning, Repository, Clock Divider, High Speed, Graphics Processing Unit, Interactive, Breakpoint, Concurrent, Concurrency, Expressions, Deasserted, Storage Device

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



1.1062

3237

3 - 0 - 72