FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Assertion topics
Social Networking
Social Network
Networking
Machine Learning
Repository
Clock Divider
High Speed
Graphics Processing Unit
Interactive
Breakpoint
Concurrent
Concurrency
Expressions
Deasserted
Storage Device

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Assertion patents



      
           
This page is updated frequently with new Assertion-related patent applications. Subscribe to the Assertion RSS feed to automatically get the update: related Assertion RSS feeds. RSS updates for this page: Assertion RSS RSS


System and method for enabling maximum performance operation within an extended ambient temperature range

Freescale Semiconductor

System and method for enabling maximum performance operation within an extended ambient temperature range

Merit-based characterization of assertions in hardware design verification

Board Of Trustees Of University Of Illinois

Merit-based characterization of assertions in hardware design verification

Date/App# patent app List of recent Assertion-related patents
04/16/15
20150106617
 Mechanisms to use network session identifiers for software-as-a-service authentication patent thumbnailnew patent Mechanisms to use network session identifiers for software-as-a-service authentication
Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (saas) server. A network access device receives a request from a client device to establish a network session and transfers identity information of the subject, the client device and the network session to a session directory database.
Cisco Technology, Inc.
04/02/15
20150091622
 System and  enabling maximum performance operation within an extended ambient temperature range patent thumbnailSystem and enabling maximum performance operation within an extended ambient temperature range
A system method of initializing operation of a semiconductor device including detecting de-assertion of an external reset signal while the semiconductor device in a reset state, monitoring a temperature level of the semiconductor device, and while the temperature level is below a predetermined minimum operating temperature level that allows the semiconductor device to operate at a maximum performance level, keeping the semiconductor device in the reset state and asserting at least one operating parameter on the semiconductor device at an elevated level to generate heat on the semiconductor device, and releasing the reset condition when the temperature level is at least the predetermined minimum operating temperature level. The operating parameter may be clock frequency or supply voltage level or a combination of both.
Freescale Semiconductor, Inc.
03/19/15
20150082263
 Merit-based characterization of assertions in hardware design verification patent thumbnailMerit-based characterization of assertions in hardware design verification
A system is configured to generate assertions for verification of an integrated circuit hardware design expressed at a register transfer level (rtl) for variables of interest, each including an antecedent and a consequent. A relative importance score for the variables is determined by characterizing respective variables by a level of importance with respect to a target variable of the consequent.
The Board Of Trustees Of The University Of Illinois
03/12/15
20150074809
  patent thumbnail
A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers.
Threatmetrix Pty Ltd
03/12/15
20150074782
 Secure  sso subscriber accessing service from outside of home network patent thumbnailSecure sso subscriber accessing service from outside of home network
When a ue (10) transits from a home mno (20) to another network (visited network) (30), the visited network (30) or the ue (10) notifies the home mno (20) of ue's location. The home mno (20) validates the ue's authenticity and its location, and sends an assertion to the sp (40) via the visited network (30) or the ue (10).
Nec Corporation
02/26/15
20150058509
 Electronic apparatus and port control method patent thumbnailElectronic apparatus and port control method
A method of an embodiment enables locking of downstream ports of a usb hub controller in an electronic apparatus. The method includes the determination step, the assertion step and the lock step.
Kabushiki Kaisha Toshiba
02/05/15
20150040190
 System and  proxying federated authentication protocols patent thumbnailSystem and proxying federated authentication protocols
A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.. .
Duo Security, Inc.
02/05/15
20150039896
 System and  pool-based identity generation and use for service access patent thumbnailSystem and pool-based identity generation and use for service access
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link..
Ebay Inc.
01/29/15
20150033305
 Methods and systems for secure and reliable identity-based computing patent thumbnailMethods and systems for secure and reliable identity-based computing
The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for identity firewalls; awareness managers; contextual purpose firewall frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like..
Advanced Elemental Technologies, Inc.
01/22/15
20150022218
 Techniques and circuits for testing a virtual power supply at an integrated circuit device patent thumbnailTechniques and circuits for testing a virtual power supply at an integrated circuit device
A power grid provides power to one or more modules of an integrated circuit device via a virtual power supply signal. A test module is configured to respond to assertion of a test signal so that, when the power grid is working properly and is not power gated, an output of the test module matches the virtual power supply.
Advanced Micro Devices, Inc.
01/15/15
20150019571

Method for population of object property assertions


Relay of information from technical documentation by contact center workers to assist clients is limited by industry standard storage formats and query mechanisms. A method is disclosed for processing technical documents and tagging them against a telecom hardware domain ontology.
Innovatia Inc.
01/01/15
20150007291

Authentication proxy agent


An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a proxy agent configured to interact with an identity provider to authenticate the client on behalf of the client, using the credentials.
Bmc Software, Inc.
01/01/15
20150007263

Maintaining privacy in a multi-tenant cloud service participating in a federated identity platform


Embodiments conceal or obfuscate tenancy in a multi-tenant cloud service participating in a federated identity platform. A cloud service receives a request for a document from a first entity.
Vmware, Inc.
01/01/15
20150002611

Computer system employing speech recognition for detection of non-speech audio


A computer system executing a computer audio application such as video conferencing applies audio detection and speech recognition to an input audio stream to generate respective audio detection and speech recognition signals. A function is applied to the audio detection and speech recognition signals to generate a non-speech audio detection signal identifying presence of non-speech audio in the input audio stream when the audio detection signal is asserted and the speech recognition signal is not asserted.
Citrix Systems, Inc.
12/18/14
20140369139

Apparatus and a erasing data stored in a memory device


The present invention provides an apparatus and method for erasing data in a memory device comprising an array of memory cells, and configured to operate from a clock signal. The apparatus includes erase circuitry, responsive to receipt of an erase signal in an asserted state, to perform a forced write operation independently of the clock signal in respect of each memory cell within a predetermined erase region of said array.
Arm Limited
12/11/14
20140365210

Systems and methods for processing patient information


Systems and methods described herein are for transforming narrative content into structured output. In some embodiments the narrative content is processed using a natural language processing (nlp) engine and a clinical model.
12/11/14
20140362263

Image sensor with noise reduction


Systems and methods are disclosed for reducing reset noise in an image sensor. Voltage on the column read out is sensed during reset.
11/27/14
20140351775

System, method, and computer program product for providing a debugger using a common hardware database


A hardware model database is identified which stores a graph-based common representation of a hardware design that includes hardware module nodes each representative of a unique module of the hardware design and associated with one or more instances of the unique module. Additionally, a signal dump resulting from a simulation of a logic code model of the hardware design is identified.
11/20/14
20140344173

System and creating executable policy rules for execution on rules-based engines


A system and method of availing executable rules for performing a government regulation compliance review using a rules-based engine may include encoding assertions into a computer-executable format. The assertions may be converted from the computer-executable format to a conventional rules-based format.
11/20/14
20140344005

System and providing a documentary audit trail in complying with government regulations


A system and method of establishing a documentary audit trail for a government regulatory compliance review may include accessing a set of assertions derived from government regulations. Subsets of the assertions may be associated with ordered steps in a workflow.
11/13/14
20140337934

System and methods for access control based on a user identity


System and methods for access control in a universal plug and play (upnp) network are based on a user identity. A control point has an identity assertion capability for identifying a user.
11/06/14
20140330586

Systems and methods for processing patient information


Systems and methods described herein are for transforming narrative content into structured output. In some embodiments the narrative content is processed using a natural language processing (nlp) engine and a clinical model.
11/06/14
20140327937

Microformat for unified printing of web content


Example embodiments relate to a microformat for unified printing of web content. In example embodiments, a system obtains web content that is displayed in a web browser, where the web content includes meta tags that specify print property assertions and print property intents.
10/30/14
20140325463

Integrated circuit design verification through forced clock glitches


A technique for determining whether an integrated circuit design is susceptible to glitches includes identifying storage elements in an original register-transfer level (rtl) file of the integrated circuit design and identifying clock signals for each of the storage elements in the original rtl file. The technique also includes generating respective assertions for each of the identified clock signals and identifying potential glitchy logic in respective clock paths for each of the identified clock signals.
10/30/14
20140324257

System and controlling the transmission of high voltage current to an electric motor in an electric vehicle


A system for controlling the transmission of high voltage current to an electric motor in an electric vehicle having a torque control module which controls high voltage power to the electric motor and a powertrain control module. The powertrain control module is connected to the torque control module via a low voltage enabling electrical conduit and a high voltage enabling electrical conduit.
10/23/14
20140317044

Method and device for real-time knowledge processing based on an ontology with temporal extensions


Embodiments are directed towards a method and a computer server for receiving assertions, wherein an assertion can have a functional property such that for a given subject and a given property the object has a single value at any time, maintaining a knowledge base that includes (1) a history table that stores previously received assertions, and (2) a snapshot table that stores currently valid assertions, maintaining a snapshot cache in memory that stores a subset of the assertions in the snapshot table, initiating a processing cycle, selecting an assertion for processing, generating an assertion tuple that corresponds to the selected assertion, determining that the property of the selected assertion is functional, writing a retraction tuple to the history table, writing the assertion tuple to the snapshot table; and writing the assertion tuple to the history table.. .
10/16/14
20140310826

Mesh grid protection system


A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid.
10/16/14
20140310540

Interrupt based power state management


A method and apparatus for power managed interrupt handling is disclosed. In one embodiment, a system includes one or more agents that may invoke an interrupt request.
10/16/14
20140306896

Method and apparatus pertaining to dynamically determining entered telephone numbers


As keys of the keyboard of a portable communication device are asserted, the device dynamically determines at least a portion of a corresponding telephone number to present on the device's display by, at least in part, considering likelihoods of differing explicit and implicit interpretations of these key assertions. By one approach this can comprise according a likelihood advantage to an explicit interpretation of one or more of the key assertions and/or implicit interpretations of such key assertions.
10/09/14
20140304776

Methods and managing network traffic


Methods, apparatus, and computer readable storage medium for authenticating assertions of a source are disclosed. In one aspect, a method for authenticating an assertion of a source in an environment of distributed control include receiving a notification of the assertion; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, determining an assertion authenticator for the entity based on a second trusted public record, determining one or more assertions of the source from the assertion authenticator, and authenticating the assertion based on the determined one or more assertions..
10/02/14
20140297356

System and customer onboarding


A system and method of performing customer onboarding may include accessing business data derived from compliance documents of a potential customer in a nosql database. Grouped assertions in a computer-executable format may be caused to be applied to the business data in a sequence.
10/02/14
20140294204

Audio amplifier mode transition


An audio amplifier is to transition between a power-down mode and an active mode, based on assertion and deassertion of a power down signal. A power down control module is to selectively assert and deassert the power down signal to the audio amplifier.
09/25/14
20140288910

System, causal implication analysis in biological networks


Described are methods, systems and apparatus for hypothesizing a biological relationship in a biological system. A database of biological assertions is provided consisting of biological elements, relationships among the biological elements, and relationship descriptors characterizing the properties of the elements and relationships.
09/25/14
20140286649

Signal level detect circuit with reduced loss-of-signal assertion delay


A signal level detect circuit configured to assess an input signal with varying amplitude signal levels and to generate an indicator signal includes an input circuit configured to receive the input signal and to process the input signal, the input circuit including a first node on which the input signal is sampled; a comparator configured to compare the processed input signal to a signal level threshold and generate a comparator output signal; and an active discharge circuit configured to provide a first discharge current to the first node in response to the comparator output signal. The comparator output signal changes from a low output state to a high output state in response to the comparator input signal, and the active discharge circuit generates the first discharge current to discharge the sampled input signal on the first node after the comparator output signal changes to the high output state..
09/18/14
20140282903

Managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media


Embodiments include managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media. In one embodiment, a method for managing idps comprises selecting, by a webrtc client executing on a computing device, one or more preferred idp identifiers indicated by one or more preferences from a plurality of idp identifiers corresponding to a plurality of idps for providing identity assertions during an establishment of a webrtc interactive flow.
09/18/14
20140282837

Privacy verification tool


Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool.
09/18/14
20140282321

System and a hybrid clock domain crossing verification


A method of hybrid clock domain crossing (cdc) verification includes receiving a design or an integrated circuit (ic) design constraints. Static cdc verification is performed, including structural and functional verification.
09/18/14
20140279906

Apparatus, multiple source disambiguation of social media communications


The present invention is directed to a system for understanding social media. The system may provide automated machine understanding of social media communications based on: social media assertions, social media statements and conversations, social connections, user profile info, crowd-sourced databases, internet pages, and semantic networks..
09/18/14
20140266632

Method and apparatus pertaining to rfid tag-based user assertions


An apparatus includes a display and one or more user-assertable surfaces. When asserted by a user, such a surface selectively couples a corresponding near-field rfid tag to a far-field component such that information stored by the near-field rfid tag is transmitted via the far-field component.
09/11/14
20140255898

Assessing reading comprehension and critical thinking using annotation objects


A competency assessment system enables reading comprehension and critical thinking skills of a knowledge worker to be assessed. The competency assessment system enables a knowledge worker to create an assertion map based on one or more source literals.
09/04/14
20140250414

Method for measuring assertion density in a system of verifying integrated circuit design


Thereafter, simulation traces for the rtl are received and the number of predicates satisfiable on the simulation traces is computed. A figure of merit of assertion density is determined from the ratio of the respective numbers of predicates.
09/04/14
20140249782

Dynamic power prediction with pin attribute data model


Systems and methods are provided for modeling the power consumption of intellectual property (ip) components of a chip by defining how individual pins operate in a particular application. A method is provided for performing a power analysis of an ip design.
08/28/14
20140245389

System and proxying federated authentication protocols


A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.. .
08/28/14
20140244233

Executing a hardware simulation and verification solution


One embodiment of the present invention provides systems and techniques to execute a hardware simulation and verification solution on a multiprocessor system. The hardware simulation and verification solution can be partitioned into different modules which can include a simulation kernel to simulate changes in signal values, a value change dump module to store the changes in the signal values on a computer-readable storage medium, a functional coverage module to check functionality, a toggle coverage module to check signal toggling, an assertion engine to check complex behaviors, and a testbench module to generate test scenarios.
08/14/14
20140229755

Pulse width modulation load share bus


Power supply modules have outputs coupled in parallel and convey load share balancing information over a single wire load share bus. Pulse width modulation (pwm) signals represent output loading of each of the power supply modules over the single wire load share bus.
08/14/14
20140229596

Dynamic generation of policy enforcement rules and actions from policy attachment semantics


At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.
08/14/14
20140229595

Policy assertion linking to processing rule contexts for policy enforcement


A selectable policy enforcement mode of a policy enforcement point (pep) is configured that, based upon a selected policy enforcement mode, selectively modifies an input message processing context. The selectively modified input message processing context is used to invoke policy enforcement rules from multiple policy domains to implement one of independent policy enforcement and sequential cascaded policy enforcement of the policy enforcement rules from the multiple policy domains.
08/14/14
20140229593

Dynamic generation of policy enforcement rules and actions from policy attachment semantics


At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.
08/07/14
20140223059

Write transaction interpretation for interrupt assertion


A method and circuit for a data processing system (12) provide a virtualized programmable interrupt control system (70) which processes interrupt event reports from interrupt sources (e.g., 14, 40) which generate write transactions to an address for an interrupt event register (80) which is authenticated and then interpreted based on the current state of the targeted interrupt to generate the next state using an interpretation table (306) and predetermined configuration/state bits (310-314).. .
07/31/14
20140215578

Adaptive audiences for claims in a social networking system


A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.
07/24/14
20140208431

Automated tools for building secure software programs


A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify application-specific security properties, for a computer software program. An assertion checker module can automatically analyze the computer software program to ensure that it satisfies the application-specific security properties.
07/24/14
20140208149

Apparatus and dynamically aligned source synchronous receiver


An apparatus including a synchronous lag receiver that receives one of a plurality of radially distributed strobes and a data bit, and that delays registering of the data bit by a propagation time. The synchronous lag receiver has a first plurality of matched inverters, a first mux, and a bit receiver.
07/24/14
20140208148

Automatic source synchronous bus signal alignment compensation mechanism


An apparatus including a joint test action group (jtag) interface and a bit lag control element. The jtag interface receives information that indicates an amount to adjust a propagation time.
07/24/14
20140208147

Apparatus and locally optimizing source synchronous data strobes


An apparatus is provided that compensates for misalignment on a synchronous data bus. The apparatus includes a bit lag control element and a synchronous lag receiver.
07/24/14
20140207766

Assertion quality assessment and management system


An assertion assessment system is presented. An assertion object that represents a relationship between an assertion and an information source can be bound to a quality measure as an indication of the quality of the assertion object.
07/24/14
20140207735

Apparatus and dynamic alignment of source synchronous bus signals


An apparatus that compensates for misalignment on a synchronous data bus. The apparatus includes a replica distribution network, a bit lag control element, and a synchronous lag receiver.
07/24/14
20140204691

Source synchronous bus signal alignment compensation mechanism


An apparatus having a bit lag control element that measures a propagation time beginning with assertion of a first signal and ending with assertion of a second signal, and that generates a first value indicating an adjusted propagation time. The control element includes delay lock control, adjust logic, and a gray encoder.
07/17/14
20140201809

Characteristics of security associations


Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a wtru, may request access to a service controlled by an access control entity (ace).
07/17/14
20140201083

System and offering a multi-partner delegated platform


A system and method for offering a delegated platform that includes configuring a partner key of a partner record on a service platform with a partner; creating an account scoped within the partner record; receiving a session authentication request that specifies a partner assertion of a partner authenticated session request of the account; authenticating the session authentication request with the partner key; and rendering an embeddable account portal with a session of the account.. .
07/10/14
20140195539

System and automatically generating systematic reviews of a scientific field


A system and method are provided for automatically generating systematic reviews of received information in a field of science and technology, such as scientific literature, where the systematic review includes a systematic review of a research field in the scientific literature. The method includes the steps of constructing a time series networks of words, passages, documents, and citations and/or co-citations within received information into a synthesized network, decomposing the networks into clusters of fields or topics, performing part-of-speech tagging of text within the received information to provide tagged text, constructing semantic structures of concepts and/or assertions extracted from the source text, generating citation-based and content-based summaries of the clusters of fields or topics and the semantic structures, and generating structured narratives of the clusters of fields or topics and the summaries of the generated semantic structures.
07/03/14
20140189827

System and scoping a user identity assertion to collaborative devices


A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion enables the devices to access an application system.
06/26/14
20140181925

Privacy enhanced key management for a web service provider using a converged security engine


In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.
06/19/14
20140172732

Psychographic based methods and systems for job seeking


A computer-implemented method for job seeking is disclosed. The method includes receiving a user request to search job openings, which request includes desired work field and user education information.
06/12/14
20140165139

Security language translations with logic resolution


Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs.
06/12/14
20140164843

System, method and computer program product for debugging an assertion


In accordance with embodiments, there are provided mechanisms and methods for debugging an assertion. These mechanisms and methods for debugging an assertion can enable improved interpretation and analysis of data validation results, more efficient development associated with data validation, etc..
06/12/14
20140164661

Methods and systems for time keeping in a data processing system


Data processing systems with interrupts and methods for operating such data processing systems and machine readable media for causing such methods and containing executable program instructions. In one embodiment, an exemplary data processing system includes a processing system, an interrupt controller coupled to the processing system and a timer circuit which is coupled to the interrupt controller.
06/05/14
20140156437

System and generating a narrative summary


A method and system for automatically generating a self-updating naturally-reading narrative product summary including assertions about a selected product. In one embodiment, the system and method includes evaluating an existing narrative product summary, comparing an existing attribute name, attribute value, attribute unit, and assertion model, respectively, to a current attribute name, attribute value, attribute unit, and assertion model to determine if one of the comparisons shows a change.
05/29/14
20140149439

Dfa-nfa hybrid


Disclosed is a hybrid architecture combining dfa and nfa based engines. The dfa engine and nfa engine scan the same input stream.


Popular terms: [SEARCH]

Assertion topics: Social Networking, Social Network, Networking, Machine Learning, Repository, Clock Divider, High Speed, Graphics Processing Unit, Interactive, Breakpoint, Concurrent, Concurrency, Expressions, Deasserted, Storage Device

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         











0.9167

3192

0 - 1 - 71