Popular terms

[SEARCH]

Assertion topics
Social Networking
Social Network
Networking
Machine Learning
Repository
Clock Divider
High Speed
Graphics Processing Unit
Interactive
Breakpoint
Concurrent
Concurrency
Expressions
Deasserted
Storage Device

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Assertion patents



      
           
This page is updated frequently with new Assertion-related patent applications. Subscribe to the Assertion RSS feed to automatically get the update: related Assertion RSS feeds. RSS updates for this page: Assertion RSS RSS


Assertion extraction from design and its signal traces

Synopsys

Assertion extraction from design and its signal traces

Controlling access to a memory

Arm Limited

Controlling access to a memory

Controlling access to a memory

International Business Machines

Boundary based power guidance for physical synthesis


Date/App# patent app List of recent Assertion-related patents
08/27/15
20150244706 
 Security object creation, validation, and assertion for single sign on authentication patent thumbnailSecurity object creation, validation, and assertion for single sign on authentication
A security object creation and validation system provides an additional factor of authentication. An authentication system as described herein provides secure two-factor authentication, such as for it resources in an organization.
Secureauth Corporation


08/27/15
20150242541 
 Assertion extraction from design and its signal traces patent thumbnailAssertion extraction from design and its signal traces
Groups of signals in an electronic design for which interesting assertions, such as assert, assume and cover properties, can be generated are identified. A sliding temporal window of fixed depth is used to sample unique present and past value combinations of signals in the signals groups generated by one or more simulations or emulations.
Synopsys, Inc.


08/27/15
20150242331 
 Controlling access to a memory patent thumbnailControlling access to a memory
A memory protection device for controlling access to a memory and a method of controlling access to a memory are disclosed. A memory status value held by latch circuitry in the memory protection device determines whether the memory is an enabled or a disabled state.
Arm Limited


08/20/15
20150234949 
 Boundary based power guidance for physical synthesis patent thumbnailBoundary based power guidance for physical synthesis
A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a logical design, and a processor to execute a synthesis engine.
International Business Machines Corporation


08/20/15
20150234948 
 Boundary based power guidance for physical synthesis patent thumbnailBoundary based power guidance for physical synthesis
A method and system to obtain a physical design of an integrated circuit from a logical design are described. The method includes performing a baseline synthesis to obtain a baseline physical design using timing constraints and an overall power budget.
International Business Machines Corporation


08/13/15
20150227744 
 Attestation using a combined measurement and its constituent measurements patent thumbnailAttestation using a combined measurement and its constituent measurements
An attestation system for asserting and verifying assertions of a known-good state of a computer system is provided. The attestation system allows a challenger and a prover to conduct an attestation so that the challenger can verify an assertion of the prover.
Facebook, Inc.


08/06/15
20150220580 
 Management, evaluation and visualization method, system and user interface for discussions and assertions patent thumbnailManagement, evaluation and visualization method, system and user interface for discussions and assertions
Various embodiments described herein relate to methods, systems, apparatus and computer-readable media for providing a graphical representation of a plurality of statements in a tree-like structure. At least a portion of the statements is displayed on a screen.

08/06/15
20150217926 
 Hinged insulated container lid patent thumbnailHinged insulated container lid
An insulated container that includes a body and a lid assembly is described. The lid assembly may include a two-piece lid (e.g., two lids) connected with at least one linkage.
The Coleman Company, Inc.


07/30/15
20150213167 
 Invariant sharing to speed up formal verification patent thumbnailInvariant sharing to speed up formal verification
Methods and apparatuses are described for sharing inductive invariants while performing formal verification of a circuit design. Specifically, some embodiments assume at least an inductive invariant for a property to be true while proving another property.
Synopsys, Inc.


07/30/15
20150212917 
 Statistical power indication monitor patent thumbnailStatistical power indication monitor
A statistical power indication monitor including a random pattern generator that generates random sample assertions of a sample signal, a total counter that counts a total number of the random sample assertions within a sample time interval, detect logic that provides a detection signal for each power indication signal that is asserted coincident with the sample signal, and counter logic that counts a number of assertions of each detection signal during the sample time interval. The assertion count of each power indication signal divided by the total count provides a statistical indication of power consumption of a corresponding system.
Freescale Semiconductor, Inc.


07/23/15
20150207804 

Media stream trust display


Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In particular, composite content having various content elements is rendered via a user interface of a browser or other application that supports web-based communications.
Microsoft Corporation


07/23/15
20150207462 

Wide common mode range sense amplifier


A device for comparing voltage levels of a pair of input signals is presented. The device may include a pre-amp circuit and a differential amplifier.
Apple Inc.


07/23/15
20150205706 

Graphical model for test case viewing, editing, and reporting


Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon.

07/23/15
20150205704 

Graphical model for test case viewing, editing, and reporting


Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon.

07/16/15
20150200924 

Redirect to inspection proxy using single-sign-on bootstrapping


An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user.
Cisco Technology, Inc.


07/16/15
20150199465 

Boundary latch and logic placement to satisfy timing constraints


Boundary timing in the design of an integrated circuit is facilitated by designating a subset of boundary latches in the circuit, and applying placement constraints to the boundary latches. Global placement is performed while maintaining the boundary latch placement constraints, and a timing driven placement is performed after implementing timing assertions.
International Business Machines Corporation


07/09/15
20150195261 

Secure session for a group of network nodes


Methods (500) of a network node (111) for creating and joining secure sessions for members (111-114) of a group of network nodes are provided. The methods comprise receiving an identity certificate and an assertion for the network node as well as a secret group key for the group.
Telefonaktiebolaget L M Ericsson (publ)


07/02/15
20150188906 

Multi-domain applications with authorization and authentication in cloud environment


A multi-domain application requiring sso and slo operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (mds) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (slos) on the domains of the multi-domain application and to invalidate the user sessions on the domains.

07/02/15
20150186783 

Using ontologies to comprehend regular expressions


Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. .
International Business Machines Corporation


07/02/15
20150186547 

Using ontologies to comprehend regular expressions


Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. .
International Business Machines Corporation


06/11/15
20150163251 

Identity assertion framework


Systems and methods for implementing an identity assertion framework to authenticate a user in a federation of security domains are provided. A first security token service associated with a first security domain is configured to receive a request for a first token from a device and issue the first token based on a first issuing policy of the first security domain.
Ebay Inc.


06/04/15
20150154104 

Continuous integration of business intelligence software


Methods for automatically testing a business intelligence artifact include authoring a business intelligence artifact selected from the group consisting of a report specification, an analysis cube, and a metadata model; creating an assertion to verify the proper functioning of the business intelligence artifact; and testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact to verify its proper functioning by determining whether the conditions of the assertion are satisfied upon execution of the business intelligence artifact in the business intelligence system.. .
Motio, Inc.


05/28/15
20150149671 

Systems and methods for biasing a bus


A bi-directional differential bus interface that includes a differential transmitter having a non-inverting terminal and an inverting terminal, a differential receiver having a non-inverting terminal and an inverting terminal, and a biasing circuit that is electrically coupled to the non-inverting terminal of the differential transmitter and the inverting terminal of the differential transmitter. The biasing circuit is configured to generate a voltage between the non-inverting terminal of the differential transmitter and the inverting terminal of the differential transmitter that is approximately 200 mv or more in response to assertion of a control signal received on a control input of the biasing circuit..
Schneider Electric It Corporation


05/14/15
20150135281 

Provisioning access to customer organization data in a multi-tenant system


Methods and systems are described for providing support representative access to applications deployed in an enterprise network environment. An access provisioning system defines a support user class in a user profile database for an application executed on an organization partition within the network.

05/14/15
20150134978 

Secure bios tamper protection mechanism


An apparatus including a rom, a selector, and a detector. The rom has a partitions, each stored as plaintext, and a encrypted digests, each comprising an encrypted version of a first digest associated with a corresponding one of the partitions.

05/14/15
20150134977 

Partition-based securing bios in a trusted computing system during execution


An apparatus including a rom, a selector, and a detector. The rom has partitions and encrypted digests.

05/14/15
20150134976 

Event-based securing bios in a trusted computing system during execution


An apparatus including a rom, an event detector, and a tamper detector. The rom has bios contents stored as plaintext, and an encrypted digest.

05/14/15
20150134975 

Secure bios mechanism in a trusted computing system


An apparatus including a rom and a microprocessor. The rom includes bios contents that are stored as plaintext and an encrypted digest.

05/07/15
20150127874 

Platform communication protocol


A host chipset heartbeat may be utilized, in some embodiments, to handle interrupts from external devices on a power efficient basis. The availability of the host chipset heartbeat may be signaled to external devices and those external devices may time their activities to a period of time when not only are resources available, but the assertion of the activity is advantageous because the host chipset is already transitioning from a lower power consumption state..
Intel Corporation


04/23/15
20150109030 

Calibrated output driver with enhanced reliability and density


An output driver configured to drive an output node includes a pull-down section having a plurality of legs and a pull-up section having a plurality of pull-up legs. Each leg and pull-up leg includes a data path and a calibration path.
Qualcomm Incorporated


04/16/15
20150106617 

Mechanisms to use network session identifiers for software-as-a-service authentication


Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (saas) server. A network access device receives a request from a client device to establish a network session and transfers identity information of the subject, the client device and the network session to a session directory database.
Cisco Technology, Inc.


04/02/15
20150091622 

System and enabling maximum performance operation within an extended ambient temperature range


A system method of initializing operation of a semiconductor device including detecting de-assertion of an external reset signal while the semiconductor device in a reset state, monitoring a temperature level of the semiconductor device, and while the temperature level is below a predetermined minimum operating temperature level that allows the semiconductor device to operate at a maximum performance level, keeping the semiconductor device in the reset state and asserting at least one operating parameter on the semiconductor device at an elevated level to generate heat on the semiconductor device, and releasing the reset condition when the temperature level is at least the predetermined minimum operating temperature level. The operating parameter may be clock frequency or supply voltage level or a combination of both.
Freescale Semiconductor, Inc.


03/19/15
20150082263 

Merit-based characterization of assertions in hardware design verification


A system is configured to generate assertions for verification of an integrated circuit hardware design expressed at a register transfer level (rtl) for variables of interest, each including an antecedent and a consequent. A relative importance score for the variables is determined by characterizing respective variables by a level of importance with respect to a target variable of the consequent.
The Board Of Trustees Of The University Of Illinois


03/12/15
20150074809 


A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers.
Threatmetrix Pty Ltd


03/12/15
20150074782 

Secure sso subscriber accessing service from outside of home network


When a ue (10) transits from a home mno (20) to another network (visited network) (30), the visited network (30) or the ue (10) notifies the home mno (20) of ue's location. The home mno (20) validates the ue's authenticity and its location, and sends an assertion to the sp (40) via the visited network (30) or the ue (10).
Nec Corporation


02/26/15
20150058509 

Electronic apparatus and port control method


A method of an embodiment enables locking of downstream ports of a usb hub controller in an electronic apparatus. The method includes the determination step, the assertion step and the lock step.
Kabushiki Kaisha Toshiba


02/05/15
20150040190 

System and proxying federated authentication protocols


A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.. .
Duo Security, Inc.


02/05/15
20150039896 

System and pool-based identity generation and use for service access


A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link..
Ebay Inc.


01/29/15
20150033305 

Methods and systems for secure and reliable identity-based computing


The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for identity firewalls; awareness managers; contextual purpose firewall frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like..
Advanced Elemental Technologies, Inc.


01/22/15
20150022218 

Techniques and circuits for testing a virtual power supply at an integrated circuit device


A power grid provides power to one or more modules of an integrated circuit device via a virtual power supply signal. A test module is configured to respond to assertion of a test signal so that, when the power grid is working properly and is not power gated, an output of the test module matches the virtual power supply.
Advanced Micro Devices, Inc.


01/15/15
20150019571 

Method for population of object property assertions


Relay of information from technical documentation by contact center workers to assist clients is limited by industry standard storage formats and query mechanisms. A method is disclosed for processing technical documents and tagging them against a telecom hardware domain ontology.
Innovatia Inc.


01/01/15
20150007291 

Authentication proxy agent


An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a proxy agent configured to interact with an identity provider to authenticate the client on behalf of the client, using the credentials.
Bmc Software, Inc.


01/01/15
20150007263 

Maintaining privacy in a multi-tenant cloud service participating in a federated identity platform


Embodiments conceal or obfuscate tenancy in a multi-tenant cloud service participating in a federated identity platform. A cloud service receives a request for a document from a first entity.
Vmware, Inc.


01/01/15
20150002611 

Computer system employing speech recognition for detection of non-speech audio


A computer system executing a computer audio application such as video conferencing applies audio detection and speech recognition to an input audio stream to generate respective audio detection and speech recognition signals. A function is applied to the audio detection and speech recognition signals to generate a non-speech audio detection signal identifying presence of non-speech audio in the input audio stream when the audio detection signal is asserted and the speech recognition signal is not asserted.
Citrix Systems, Inc.


12/18/14
20140369139 

Apparatus and a erasing data stored in a memory device


The present invention provides an apparatus and method for erasing data in a memory device comprising an array of memory cells, and configured to operate from a clock signal. The apparatus includes erase circuitry, responsive to receipt of an erase signal in an asserted state, to perform a forced write operation independently of the clock signal in respect of each memory cell within a predetermined erase region of said array.
Arm Limited


12/11/14
20140365210 

Systems and methods for processing patient information


Systems and methods described herein are for transforming narrative content into structured output. In some embodiments the narrative content is processed using a natural language processing (nlp) engine and a clinical model.

12/11/14
20140362263 

Image sensor with noise reduction


Systems and methods are disclosed for reducing reset noise in an image sensor. Voltage on the column read out is sensed during reset.

11/27/14
20140351775 

System, method, and computer program product for providing a debugger using a common hardware database


A hardware model database is identified which stores a graph-based common representation of a hardware design that includes hardware module nodes each representative of a unique module of the hardware design and associated with one or more instances of the unique module. Additionally, a signal dump resulting from a simulation of a logic code model of the hardware design is identified.

11/20/14
20140344173 

System and creating executable policy rules for execution on rules-based engines


A system and method of availing executable rules for performing a government regulation compliance review using a rules-based engine may include encoding assertions into a computer-executable format. The assertions may be converted from the computer-executable format to a conventional rules-based format.

11/20/14
20140344005 

System and providing a documentary audit trail in complying with government regulations


A system and method of establishing a documentary audit trail for a government regulatory compliance review may include accessing a set of assertions derived from government regulations. Subsets of the assertions may be associated with ordered steps in a workflow.

11/13/14
20140337934 

System and methods for access control based on a user identity


System and methods for access control in a universal plug and play (upnp) network are based on a user identity. A control point has an identity assertion capability for identifying a user.

11/06/14
20140330586 

Systems and methods for processing patient information


Systems and methods described herein are for transforming narrative content into structured output. In some embodiments the narrative content is processed using a natural language processing (nlp) engine and a clinical model.

11/06/14
20140327937 

Microformat for unified printing of web content


Example embodiments relate to a microformat for unified printing of web content. In example embodiments, a system obtains web content that is displayed in a web browser, where the web content includes meta tags that specify print property assertions and print property intents.

10/30/14
20140325463 

Integrated circuit design verification through forced clock glitches


A technique for determining whether an integrated circuit design is susceptible to glitches includes identifying storage elements in an original register-transfer level (rtl) file of the integrated circuit design and identifying clock signals for each of the storage elements in the original rtl file. The technique also includes generating respective assertions for each of the identified clock signals and identifying potential glitchy logic in respective clock paths for each of the identified clock signals.

10/30/14
20140324257 

System and controlling the transmission of high voltage current to an electric motor in an electric vehicle


A system for controlling the transmission of high voltage current to an electric motor in an electric vehicle having a torque control module which controls high voltage power to the electric motor and a powertrain control module. The powertrain control module is connected to the torque control module via a low voltage enabling electrical conduit and a high voltage enabling electrical conduit.

10/23/14
20140317044 

Method and device for real-time knowledge processing based on an ontology with temporal extensions


Embodiments are directed towards a method and a computer server for receiving assertions, wherein an assertion can have a functional property such that for a given subject and a given property the object has a single value at any time, maintaining a knowledge base that includes (1) a history table that stores previously received assertions, and (2) a snapshot table that stores currently valid assertions, maintaining a snapshot cache in memory that stores a subset of the assertions in the snapshot table, initiating a processing cycle, selecting an assertion for processing, generating an assertion tuple that corresponds to the selected assertion, determining that the property of the selected assertion is functional, writing a retraction tuple to the history table, writing the assertion tuple to the snapshot table; and writing the assertion tuple to the history table.. .

10/16/14
20140310826 

Mesh grid protection system


A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid.

10/16/14
20140310540 

Interrupt based power state management


A method and apparatus for power managed interrupt handling is disclosed. In one embodiment, a system includes one or more agents that may invoke an interrupt request.

10/16/14
20140306896 

Method and apparatus pertaining to dynamically determining entered telephone numbers


As keys of the keyboard of a portable communication device are asserted, the device dynamically determines at least a portion of a corresponding telephone number to present on the device's display by, at least in part, considering likelihoods of differing explicit and implicit interpretations of these key assertions. By one approach this can comprise according a likelihood advantage to an explicit interpretation of one or more of the key assertions and/or implicit interpretations of such key assertions.

10/09/14
20140304776 

Methods and managing network traffic


Methods, apparatus, and computer readable storage medium for authenticating assertions of a source are disclosed. In one aspect, a method for authenticating an assertion of a source in an environment of distributed control include receiving a notification of the assertion; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, determining an assertion authenticator for the entity based on a second trusted public record, determining one or more assertions of the source from the assertion authenticator, and authenticating the assertion based on the determined one or more assertions..

10/02/14
20140297356 

System and customer onboarding


A system and method of performing customer onboarding may include accessing business data derived from compliance documents of a potential customer in a nosql database. Grouped assertions in a computer-executable format may be caused to be applied to the business data in a sequence.

10/02/14
20140294204 

Audio amplifier mode transition


An audio amplifier is to transition between a power-down mode and an active mode, based on assertion and deassertion of a power down signal. A power down control module is to selectively assert and deassert the power down signal to the audio amplifier.

09/25/14
20140288910 

System, causal implication analysis in biological networks


Described are methods, systems and apparatus for hypothesizing a biological relationship in a biological system. A database of biological assertions is provided consisting of biological elements, relationships among the biological elements, and relationship descriptors characterizing the properties of the elements and relationships.

09/25/14
20140286649 

Signal level detect circuit with reduced loss-of-signal assertion delay


A signal level detect circuit configured to assess an input signal with varying amplitude signal levels and to generate an indicator signal includes an input circuit configured to receive the input signal and to process the input signal, the input circuit including a first node on which the input signal is sampled; a comparator configured to compare the processed input signal to a signal level threshold and generate a comparator output signal; and an active discharge circuit configured to provide a first discharge current to the first node in response to the comparator output signal. The comparator output signal changes from a low output state to a high output state in response to the comparator input signal, and the active discharge circuit generates the first discharge current to discharge the sampled input signal on the first node after the comparator output signal changes to the high output state..

09/18/14
20140282903 

Managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media


Embodiments include managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media. In one embodiment, a method for managing idps comprises selecting, by a webrtc client executing on a computing device, one or more preferred idp identifiers indicated by one or more preferences from a plurality of idp identifiers corresponding to a plurality of idps for providing identity assertions during an establishment of a webrtc interactive flow.

09/18/14
20140282837 

Privacy verification tool


Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool.

09/18/14
20140282321 

System and a hybrid clock domain crossing verification


A method of hybrid clock domain crossing (cdc) verification includes receiving a design or an integrated circuit (ic) design constraints. Static cdc verification is performed, including structural and functional verification.

09/18/14
20140279906 

Apparatus, multiple source disambiguation of social media communications


The present invention is directed to a system for understanding social media. The system may provide automated machine understanding of social media communications based on: social media assertions, social media statements and conversations, social connections, user profile info, crowd-sourced databases, internet pages, and semantic networks..

09/18/14
20140266632 

Method and apparatus pertaining to rfid tag-based user assertions


An apparatus includes a display and one or more user-assertable surfaces. When asserted by a user, such a surface selectively couples a corresponding near-field rfid tag to a far-field component such that information stored by the near-field rfid tag is transmitted via the far-field component.

09/11/14
20140255898 

Assessing reading comprehension and critical thinking using annotation objects


A competency assessment system enables reading comprehension and critical thinking skills of a knowledge worker to be assessed. The competency assessment system enables a knowledge worker to create an assertion map based on one or more source literals.

09/04/14
20140250414 

Method for measuring assertion density in a system of verifying integrated circuit design


Thereafter, simulation traces for the rtl are received and the number of predicates satisfiable on the simulation traces is computed. A figure of merit of assertion density is determined from the ratio of the respective numbers of predicates.

09/04/14
20140249782 

Dynamic power prediction with pin attribute data model


Systems and methods are provided for modeling the power consumption of intellectual property (ip) components of a chip by defining how individual pins operate in a particular application. A method is provided for performing a power analysis of an ip design.

08/28/14
20140245389 

System and proxying federated authentication protocols


A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.. .

08/28/14
20140244233 

Executing a hardware simulation and verification solution


One embodiment of the present invention provides systems and techniques to execute a hardware simulation and verification solution on a multiprocessor system. The hardware simulation and verification solution can be partitioned into different modules which can include a simulation kernel to simulate changes in signal values, a value change dump module to store the changes in the signal values on a computer-readable storage medium, a functional coverage module to check functionality, a toggle coverage module to check signal toggling, an assertion engine to check complex behaviors, and a testbench module to generate test scenarios.

08/14/14
20140229755 

Pulse width modulation load share bus


Power supply modules have outputs coupled in parallel and convey load share balancing information over a single wire load share bus. Pulse width modulation (pwm) signals represent output loading of each of the power supply modules over the single wire load share bus.

08/14/14
20140229596 

Dynamic generation of policy enforcement rules and actions from policy attachment semantics


At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.

08/14/14
20140229595 

Policy assertion linking to processing rule contexts for policy enforcement


A selectable policy enforcement mode of a policy enforcement point (pep) is configured that, based upon a selected policy enforcement mode, selectively modifies an input message processing context. The selectively modified input message processing context is used to invoke policy enforcement rules from multiple policy domains to implement one of independent policy enforcement and sequential cascaded policy enforcement of the policy enforcement rules from the multiple policy domains.

08/14/14
20140229593 

Dynamic generation of policy enforcement rules and actions from policy attachment semantics


At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.

08/07/14
20140223059 

Write transaction interpretation for interrupt assertion


A method and circuit for a data processing system (12) provide a virtualized programmable interrupt control system (70) which processes interrupt event reports from interrupt sources (e.g., 14, 40) which generate write transactions to an address for an interrupt event register (80) which is authenticated and then interpreted based on the current state of the targeted interrupt to generate the next state using an interpretation table (306) and predetermined configuration/state bits (310-314).. .

07/31/14
20140215578 

Adaptive audiences for claims in a social networking system


A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.

07/24/14
20140208431 

Automated tools for building secure software programs


A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify application-specific security properties, for a computer software program. An assertion checker module can automatically analyze the computer software program to ensure that it satisfies the application-specific security properties.

07/24/14
20140208149 

Apparatus and dynamically aligned source synchronous receiver


An apparatus including a synchronous lag receiver that receives one of a plurality of radially distributed strobes and a data bit, and that delays registering of the data bit by a propagation time. The synchronous lag receiver has a first plurality of matched inverters, a first mux, and a bit receiver.

07/24/14
20140208148 

Automatic source synchronous bus signal alignment compensation mechanism


An apparatus including a joint test action group (jtag) interface and a bit lag control element. The jtag interface receives information that indicates an amount to adjust a propagation time.

07/24/14
20140208147 

Apparatus and locally optimizing source synchronous data strobes


An apparatus is provided that compensates for misalignment on a synchronous data bus. The apparatus includes a bit lag control element and a synchronous lag receiver.

07/24/14
20140207766 

Assertion quality assessment and management system


An assertion assessment system is presented. An assertion object that represents a relationship between an assertion and an information source can be bound to a quality measure as an indication of the quality of the assertion object.

07/24/14
20140207735 

Apparatus and dynamic alignment of source synchronous bus signals


An apparatus that compensates for misalignment on a synchronous data bus. The apparatus includes a replica distribution network, a bit lag control element, and a synchronous lag receiver.

07/24/14
20140204691 

Source synchronous bus signal alignment compensation mechanism


An apparatus having a bit lag control element that measures a propagation time beginning with assertion of a first signal and ending with assertion of a second signal, and that generates a first value indicating an adjusted propagation time. The control element includes delay lock control, adjust logic, and a gray encoder.

07/17/14
20140201809 

Characteristics of security associations


Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a wtru, may request access to a service controlled by an access control entity (ace).

07/17/14
20140201083 

System and offering a multi-partner delegated platform


A system and method for offering a delegated platform that includes configuring a partner key of a partner record on a service platform with a partner; creating an account scoped within the partner record; receiving a session authentication request that specifies a partner assertion of a partner authenticated session request of the account; authenticating the session authentication request with the partner key; and rendering an embeddable account portal with a session of the account.. .

07/10/14
20140195539 

System and automatically generating systematic reviews of a scientific field


A system and method are provided for automatically generating systematic reviews of received information in a field of science and technology, such as scientific literature, where the systematic review includes a systematic review of a research field in the scientific literature. The method includes the steps of constructing a time series networks of words, passages, documents, and citations and/or co-citations within received information into a synthesized network, decomposing the networks into clusters of fields or topics, performing part-of-speech tagging of text within the received information to provide tagged text, constructing semantic structures of concepts and/or assertions extracted from the source text, generating citation-based and content-based summaries of the clusters of fields or topics and the semantic structures, and generating structured narratives of the clusters of fields or topics and the summaries of the generated semantic structures.

07/03/14
20140189827 

System and scoping a user identity assertion to collaborative devices


A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion enables the devices to access an application system.

06/26/14
20140181925 

Privacy enhanced key management for a web service provider using a converged security engine


In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.

06/19/14
20140172732 

Psychographic based methods and systems for job seeking


A computer-implemented method for job seeking is disclosed. The method includes receiving a user request to search job openings, which request includes desired work field and user education information.

06/12/14
20140165139 

Security language translations with logic resolution


Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs.



Popular terms: [SEARCH]

Assertion topics: Social Networking, Social Network, Networking, Machine Learning, Repository, Clock Divider, High Speed, Graphics Processing Unit, Interactive, Breakpoint, Concurrent, Concurrency, Expressions, Deasserted, Storage Device

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.957

4544

1 - 1 - 101