Popular terms

Assertion topics
Social Networking
Social Network
Networking
Machine Learning
Repository
Clock Divider
High Speed
Graphics Processing Unit
Interactive
Breakpoint
Concurrent
Concurrency
Expressions
Deasserted
Storage Device

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Assertion patents



      

This page is updated frequently with new Assertion-related patent applications.




Date/App# patent app List of recent Assertion-related patents
05/19/16
20160142404 
 Identity assertion based on biometric information patent thumbnailIdentity assertion based on biometric information
A method and apparatus for providing a lifetime extension to an identity assertion is provided herein. During operation a user will authenticate to an identity management server (also known as an authorization server or an authentication server) to obtain an identity assertion.
Motorola Solutions, Inc.


05/19/16
20160142400 
 Systems and methods for system login and single sign-on patent thumbnailSystems and methods for system login and single sign-on
Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected application of a second system.
Openlane, Inc.


05/19/16
20160140323 
 System and  providing a health determination service based on user knowledge and activity patent thumbnailSystem and providing a health determination service based on user knowledge and activity
Examples are provided herein for providing a service in connection with determining a health of a user. A collection of questions are stored for the user, with each question being based on a documented assertion pertaining to human health.
Health Equity Labs


05/19/16
20160140281 
 System on chip i/o connectivity verification in presence of low power design considerations patent thumbnailSystem on chip i/o connectivity verification in presence of low power design considerations
Formal verification of connectivity of a circuit, for example, a circuit representing a system on chip i/o ring is performed with low power considerations. The formal verification determines whether the connectivity of a circuit remains valid when low power design specification is introduced.
Synopsys, Inc.


05/19/16
20160137151 
 Object restraint systems and methods of operation thereof patent thumbnailObject restraint systems and methods of operation thereof
Embodiments include object restraint systems and methods of their operation. The system is contained in a vehicle with a passenger compartment, and includes sensor and processing subsystems, a vessel, a restraint mechanism, and an actuator.
Freescale Semiconductor, Inc.


05/12/16
20160134619 
 System and  single sign-on technical support access to tenant accounts and data in a multi-tenant platform patent thumbnailSystem and single sign-on technical support access to tenant accounts and data in a multi-tenant platform
Shown is single sign-on support access to tenant accounts in a multi-tenant service platform involving a proxy user account in an identity provider for a tenant account on the service platform having security metadata associated therewith, mapping in the identity provider maps a support user to a proxy user identifier, a corresponding security endpoint in the service platform and mapping of the proxy user account identifier to the tenant account and security metadata. The identity provider authenticates a request to access the tenant account on the service platform, obtains the security credentials for the proxy user identifier, and sends a security assertion with the proxy user identifier and the security metadata to the security endpoint.
Zuora, Inc.


05/12/16
20160134085 
 Igniter and vehicle, and  controlling ignition coil patent thumbnailIgniter and vehicle, and controlling ignition coil
An igniter that includes switch element and switch control device for controlling the switch element depending on ignition signal. The switch control device includes a determination stage that compares voltage associated with the ignition signal with a predetermined voltage to generate a determination signal, a driving stage that controls on/off operations of the switch element depending on the determination signal, a timer circuit that asserts a conduction protection signal when state where the determination signal becomes an assert level corresponding to an on operation of the switch element continues for predetermined time, a time-varying voltage generating circuit that generates time-varying voltage over time in response to the assertion of the conduction protection signal, and an amplifier that changes the voltage of a control terminal of the switch element such that detection voltage associated with coil current flowing in the switch element is close to the time-varying voltage..
Rohm Co., Ltd.


05/05/16
20160127353 
 Method and  enabling secured certificate enrollment in a hybrid cloud public key infrastructure patent thumbnailMethod and enabling secured certificate enrollment in a hybrid cloud public key infrastructure
In a method a public key infrastructure (pki) device receives a certificate signing request (csr) and an identity assertion cryptographically bound to an end entity issuing the csr. The pki device validates the authenticity and integrity of the csr using the identity assertion.
Motorola Solutions, Inc.


05/05/16
20160127351 
 Continuous multi-factor authentication patent thumbnailContinuous multi-factor authentication
Technologies for continuously authenticating a user via multiple authentication factors include a computing device for generating a continuous authentication assertion indicating that continuous authentication of a user is being monitored, sending the continuous authentication assertion to a key distribution center server, and requesting and receiving an initial ticket from the key distribution center server. Such technologies may also include requesting a service ticket from the key distribution center server for accessing a service provider server, receiving a service ticket from the key distribution center server including the continuous authentication assertion, requesting access to the service provider server with the service ticket including the continuous authentication assertion, and accessing the service provider server in response to the continuous authentication assertion being verified..

05/05/16
20160124874 
 Method and  interrupt coalescing patent thumbnailMethod and interrupt coalescing
Apparatus and methods implemented therein moderate the rate at which a peripheral device interrupts the operation of a host device. Moderation of interrupts is achieved by implementing interrupt coalescing schemes.
Sandisk Technologies Inc.


05/05/16
20160124800 

Microcontroller unit and operating a microcontroller unit


A microcontroller unit (mcu) having a functional state, a reset state, and one or more assertable fault sources is described. Each fault source has its own fault source assertion count and its own fault source assertion limit; the mcu is arranged to perform the following sequence of operations in a cyclic manner: if one or more of the fault sources are asserted, pass from the functional state to the reset state and increase the respective fault source assertion counts by one increment; if one or more of the fault source assertion counts exceeds the respective fault source assertion limit, disable the respective fault source; and pass from the reset state to the functional state.
Freescale Semiconductor, Inc.


05/05/16
20160124771 

Throttling circuitry


Techniques are disclosed relating to processor power control and interrupts. In one embodiment, an apparatus includes a processor configured to assert an indicator that the processor is suspending execution of instructions until the processor receives an interrupt.
Apple Inc.


05/05/16
20160124487 

Storage device and processing power disable signal


A storage device for connection with a host device via an interface bus, includes a storage unit and a storage controller configured to control access to the storage unit and receive a power disable signal from the host device. The storage controller includes a plurality of processing units, each of which receives an interrupt signal to initiate power disable processing, in response to assertion of the power disable signal..
Kabushiki Kaisha Toshiba


04/28/16
20160119383 

Dynamic generation of policy enforcement rules and actions from policy attachment semantics


At least one set of enforceable policy provisions is identified within at least one defined service level policy to be enforced during runtime by a policy enforcement point (pep). Each set of enforceable policy provisions includes a policy subject, a reference to a policy domain, and at least one assertion.
International Business Machines Corporation


04/28/16
20160119323 

Single sign on for native and wrapped web resources on mobile devices


A method includes performing operations as follows on a processor: associating a single sign on module with a native application residing on a mobile device, detecting, using the single sign on module, user invocation of the native application, the native application to request access to a resource from a service provider server, determining, using the single sign on module, whether the mobile device has a token stored thereon that indicates the user has been previously authenticated with an identity provider server, sending, using the single sign on module, the token to the identity provider server when the token is determined to be stored on the mobile device, receiving, at the single sign on module, an identity assertion for the user from the identity provider server responsive to sending the token to the identity provider server, and providing, using the single sign on module, the identity assertion to the native application. The service provider server is independent of the identity provider server..
Ca, Inc.


04/28/16
20160118916 

Fan motor driving apparatus and method, cooling system including the same, and electronic equipment


A motor driving apparatus comprises an h bridge circuit having outputs coupled with a motor coil of a single-phase motor, a hall comparator configured to generate a hall detection signal indicating a position of a rotor of the motor, an electric angle generator configured to generate a pulse signal indicating that the motor rotates by a predetermined electric angle, a current monitoring circuit configured to asserts a zero current detection signal upon detecting a reversed direction of a coil current; a transition trigger circuit configured to assert a transition pulse when a count value of the first counter matches an lead angle set value; a logic circuit configured to transition the h bridge circuit according to a predetermined sequence of states; and a lead angle controller configured to adjust the lead angle set value based on a timing of assertion of the zero current detection signal.. .
Rohm Co., Ltd.


04/28/16
20160118091 

Memory device and performing a write operation in a memory device


The present invention provides a technique for performing write operations within a memory device comprising an array of memory cells. Wordline driver circuitry is used to assert a wordline signal to activate an addressed memory cell in the array.
Arm Limited


04/14/16
20160105017 

Over-voltage protection circuit for a drive transistor


A drive transistor is connected to a resonant load in a low-side drive configuration. The voltage across the conduction terminals of the drive transistor is sensed and compared to an over-voltage threshold.

04/07/16
20160098497 

Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a logical design, and a processor to execute a synthesis engine.
International Business Machines Corporation


03/31/16
20160094543 

Federated full domain logon


Methods and systems for faster and more efficient smart card logon and for giving a client device full domain access in a remote computing environment are described herein. Components used to implement fast smart card logon may also be used to implement a federated full domain logon.
Citrix Systems, Inc.


03/31/16
20160092703 

Mesh grid protection system


A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid lines.
Broadcom Corporation


03/17/16
20160080138 

Method and timing synchronization in a distributed timing system


In one aspect of the teachings herein, a timing circuit detects the assertion of an incoming timing pulse signal at a timing resolution higher than that afforded by the sampling clock signal used to detect the assertion event. To do so, the timing circuit uses delay circuitry to obtain incrementally delayed versions of the incoming timing pulse signal or sampling clock signal.
Telefonaktiebolaget L M Ericsson (publ)


03/17/16
20160078149 

Identification and verification of factual assertions in natural language


A system for verifying factual assertions in natural language. Receiving a text input.
International Business Machines Corporation


03/10/16
20160072824 

Social networking behavior-based identity system


Disclosed are various embodiments for a social networking behavior-based identity system that employs social networking data that a user has elected to share through an opt-in procedure. First social networking data is stored in association with a user identity.
Amazon Technologies, Inc.


03/10/16
20160072802 

Systems and methods for performing user recognition based on biometric information captured with wearable electronic devices


Systems and methods are disclosed herein for performing biometrics based user recognition and monitoring based on biometric information captured using wearable monitoring devices. More specifically, the present application provides systems including monitoring devices built into one or more articles of clothing that capture data relating to the wearer of the device and other subjects, such as biometric information, health vitals, environmental information, location data and the like.
Hoyos Labs Corp.


03/10/16
20160072438 

Dynamic gearshift during oscillator build-up based on duty cycle


A dynamic gearshifting system includes a monitoring device configured to monitor a duty cycle of a clock output signal of a crystal oscillator circuit during oscillation buildup upon power-up of the crystal oscillator circuit. The dynamic gearshifting system also includes a detecting device configured to detect whether the duty cycle of the clock output signal of the crystal oscillator circuit meets a duty cycle threshold value.
Gainspan Corporation


03/10/16
20160071574 

Method and circuits for low latency initialization of static random access memory


A method and various circuit embodiments for low latency initialization of an sram are disclosed. In one embodiment, an ic includes an sram coupled to at least one functional circuit block.
Apple Inc.


03/03/16
20160063495 

Method for issuing an assertion of location


A method provides a location assertion for a transaction device that has requested, from a server and via a communication network, acceptance of a financial transaction involving the use of banking information. The method includes: receiving a transaction request from the transaction device, including at least one user identifier with which the banking information is associated; a obtaining an ip address associated with the transaction device; determining a current location associated with the ip address; comparing the current location to at least one authorized location on the basis of the identifier of the user; and providing a location assertion to an entity when the comparison step yields a positive result..
Ingenico Group


03/03/16
20160063390 

Probabilistic assertions and verifying them


Various techniques for evaluating probabilistic assertions are described herein. In one example, a method includes transforming a program, a probabilistic assertion, and an input into an intermediate representation, the intermediate representation including a bayesian network of nodes representing distributions.
Microsoft Corporation


02/25/16
20160057202 

Sharing asserted media


Concepts and technologies are disclosed herein for sharing asserted media. An assertion application can be executed by a device to generate asserted media.
At&t Intellectual Property I, L.p.


02/25/16
20160056811 

Testable power-on-reset circuit


An integrated circuit with a testable power-on-reset (por) circuit includes a voltage divider, an inverter, a level-shifter, a buffer and a flip-flop. The voltage divider receives a first supply voltage and generates a second supply voltage.
Freescale Semiconductor, Inc.


02/18/16
20160048155 

Reset circuitry for integrated circuit


An on-board reset circuit for a system-on-chip (soc) addresses the problem of meta-stability in flip-flops on asynchronous reset that arises when different power domains or reset domains receive resets from different sources. To ameliorate the problem, a reset signal is asserted and de-asserted while the clocks are gated.
Freescale Semiconductor, Inc.


02/11/16
20160044124 

Network traffic monitoring system and method to redirect network traffic through a network intermediary


A network traffic monitoring system for redirecting network traffic between a client device and a cloud service includes a monitor proxy server configured as a network intermediary between the client device and the cloud service; and a published identity provider. The published identity provider is configured to receive a login request from a client device and to authenticate the client device at a federated identity provider.
Skyhigh Networks, Inc.


02/11/16
20160042098 

Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The method includes performing a baseline synthesis to obtain a baseline physical design using timing constraints and an overall power budget.
International Business Machines Corporation


02/04/16
20160030840 

Stack roster fantasy sports game and platform


A method and system for playing a fantasy sport competition among a plurality of users, includes instructions stored on a non-transitory computer readable medium for transmitting user selections to suitably order players in the user roster. Any user requests to commence a draft.
Sport Gamet International Llc


01/28/16
20160029318 

Method for waking a data transceiver through data reception


A method for managing power in a system, in which the system may include a first device configured to transmit serial data and a second device, coupled to the first device. The second device may include a transceiver and interrupt logic, and may be configured to activate the interrupt logic and enable a reduced power mode for the transceiver.
Apple Inc.


01/28/16
20160028708 

Digital credential with embedded authentication instructions


Methods and systems are provided for sending messages in a security system. In particular, a new message syntax can include one or more positive assertions that may be verified.
Assa Abloy Ab


12/31/15
20150381625 

Secure mobile client with assertions for access to service provider applications


A software-as-a-service (saas) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more saas applications to access, and including an idp identifier for the saas application. The saas access control application includes software to be inserted into a network software stack of the client device and software configured to serve as an identity provider for assertions.
Cisco Technology, Inc.


12/31/15
20150381545 

Providing a guest with access to content of a social network


Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. .
International Business Machines Corporation


12/31/15
20150381524 

Providing a guest with access to content of a social network


Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. .
International Business Machines Corporation


12/31/15
20150379108 

Data mining in a business intelligence document


A business intelligence document provides functionality for testing a hypothesis on aggregated data in a business intelligence document (e.g., a spreadsheet-like document), wherein one or more of the input data values and transformation properties are designated as constrained (e.g., invariant or constrained within a range, set, enumeration, or domain). The hypothesis, which is articulated as a data mining assertion, is input through the user interface of the business intelligence document (e.g., via an expression interface or properties of a row, column, or cell) and solved over the aggregated data.
Microsoft Technology Licensing, Llc


12/31/15
20150378841 

Techniques to communicate with a controller for a non-volatile dual in-line memory module


Examples may include communicating with a controller for a non-volatile dual in-line memory module through a system management bus (smbus) interface. In some examples, selective assertion of bits maintained in registers accessible through the smbus interface may enable communication with the controller.

12/17/15
20150364993 

Boost converter stage switch controller


A low voltage lamp includes a boost converter stage and a load. The load may include low voltage light producing elements including low voltage light emitting diodes.
Cirrus Logic, Inc.


12/17/15
20150363705 

System and utilizing a logical graphical model for scenario analysis


A system and method for utilizing a logical graphical model for data analysis are described. The system provides a “pgm authoring tool” that enables a user to employ a logical graphical model to create, edit, and browse the assertions and inferences in a probabilistic graphical model..
Clados Management Llc


12/17/15
20150363481 

Systems, devices, and/or methods for managing information


Certain exemplary embodiments can provide a system, machine, device, manufacture, circuit, composition of matter, and/or user interface adapted for and/or resulting from, and/or a method and/or machine-readable medium comprising machine-implementable instructions for, activities that can comprise and/or relate to, automatically generating a story regarding a predetermined topic from a plurality of assertions.. .

12/03/15
20150350212 

Methods and systems for authorizing web service requests


Systems and methods for authorizing web service requests. In some embodiments, a computer-implemented method includes receiving a web service request having an authorization header and business code, authenticating a security assertion markup language (saml) token included in the authorization header and constructing a security context based on attributes of the saml token.
General Electric Company


12/03/15
20150348043 

Method of identification, corresponding device and program


A method and device are provided for method for identifying a user for access to an article or a service. The method includes: presentation to a terminal, by the user to be identified, of a payment card; execution, by the terminal, of a payment transaction, the amount of which is zero; and when said payment transaction is executed without error, issuing an assertion of identification leading to access to the article or service..
Ingenico Group


12/03/15
20150346801 

Method and appartus for distributed power assertion


A method and an apparatus for a power assertion management are described. A power assertion indicator may be maintained for a device component having a power level.
Apple Inc.


11/26/15
20150341332 

Privacy enhanced key management for a web service provider using a converged security engine


In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.
Intel Corporation


11/19/15
20150331993 

Custom knowledgebases and sequence datasets


Illustrative embodiments of custom knowledgebases and sequence datasets, as well as related methods, are disclosed. In one illustrative embodiment, one or more computer-readable media may comprise a custom knowledgebase and an associated sequence dataset.
Battelle Memorial Institute


11/05/15
20150319156 

Independent identity management systems


Systems, methods and apparatus embodiments are described herein for authenticating a user and/or a user equipment (ue). For example, a user and/or ue may request access to a service controlled by a service provider (sp).
Interdigital Patent Holdings Inc.


10/29/15
20150310225 

Privacy verification tool


Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool.
Facebook, Inc.


10/22/15
20150302358 

Method and enabling a user assertion service for visitors to web pages


A method and user interface object for invoking a user assertion service to operate with a web page are disclosed. Consistent with one embodiment of the invention, a web portal hosting a user assertion service enables an evaluator to include a user interface element on his requirement posting.

10/22/15
20150302357 

Method and system for evaluating user assertions


The various embodiments herein disclose a method and system for enabling users to make assertions of suitability and have other users evaluate those assertions. According to an embodiment of the present invention, the method comprises steps of receiving an application along with a guarantee from an applicant.

10/01/15
20150281204 

Traffic on-boarding for acceleration through out-of-band security authenticators


A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource.
Akamai Technologies, Inc.


10/01/15
20150278792 

Method for verifying the authenticity of a terminal, corresponding device and program


A method is provided for verifying an authenticity of a payment terminal, implemented by using of a device for verifying authenticity. The method includes: transmitting to the payment terminal a request for obtaining a piece of identification data by using of a contactless communications interface; receiving a response, through said contactless communications interface and coming from the payment terminal, to said request for obtaining a piece of identification data; comparing a field of said response with at least one piece of pre-recorded identification data; when the field includes a piece of identification data identical to said at least one piece of pre-recorded identification data, for issuing an assertion of authenticity of said payment terminal; when the field comprises a piece of identification data different from said at least one piece of pre-recorded identification data, issuing a piece of information on absence of authentication of the payment terminal..
Compagnie Industrielle Et Financiere D'ingenierie "ingenico"


10/01/15
20150278416 

Clock verification


Methods and systems for verifying a derived clock using assertion-based verification. The method comprises counting the number of full or half cycles of a fast clock that occur between the rising edge and the falling edge of a slow clock (i.e.
Imagination Technologies Limited


09/24/15
20150271185 

Method and device for operating a vehicle application


In a method, each received vehicle-to-x message is at least partly forwarded to at least one application of a vehicle depending on specified information of the vehicle-to-x message (n), the vehicle-to-x message comprising a digital signature. Digital signatures of the vehicle-to-x messages relevant to the decision that a specified action of the application should be carried out are validated depending on a decision signal provided in response to the vehicle-to-x messages being forwarded to the at least one application and which represents an assertion as to whether the vehicle-to-x messages comprise data causing the action to be carried out.
Continental Automotive Gmbh


09/17/15
20150262547 

Receiver circuit and operating the same


A receiver circuit includes a clk_lp circuit, a clk_hs circuit, a data_lp circuit, a data_hs circuit and a malfunction detection circuit. The clk_lp circuit and the clk_hs circuit are connected to the clock lane.
Synaptics Display Devices Kk


09/17/15
20150261881 

Logical data flow mapping rules for (sub) graph isomorphism in a cluster computing environment


A system and a method are disclosed for transforming cluster computing resources of a target system to match a user defined logical data flow so data processing between the source and target are functionally equivalent. The source logical dataflow is compatibly mapped to a target directed acyclic graph that represents the cluster computing resources.
Concurrent, Inc.


09/03/15
20150249645 

Systems and methods for providing secure access to local network devices


A computer-implemented method for providing secure access to local network devices may include (1) identifying a local area network that provides internet connectivity to at least one device within the local area network, (2) obtaining, from an identity assertion provider, (i) a shared secret for authenticating the identity of a guest user of the device and (ii) a permission for the guest user to access the device from outside the local area network, (3) storing the shared secret and the permission within the local area network, (4) receiving, via the internet connectivity, a request by the guest user from outside the local area network to access the device, and (5) providing access to the device in response to validating the request based on the shared secret and the permission. Various other methods and systems are also disclosed..
Symantec Corporation


08/27/15
20150244706 

Security object creation, validation, and assertion for single sign on authentication


A security object creation and validation system provides an additional factor of authentication. An authentication system as described herein provides secure two-factor authentication, such as for it resources in an organization.
Secureauth Corporation


08/27/15
20150242541 

Assertion extraction from design and its signal traces


Groups of signals in an electronic design for which interesting assertions, such as assert, assume and cover properties, can be generated are identified. A sliding temporal window of fixed depth is used to sample unique present and past value combinations of signals in the signals groups generated by one or more simulations or emulations.
Synopsys, Inc.


08/27/15
20150242331 

Controlling access to a memory


A memory protection device for controlling access to a memory and a method of controlling access to a memory are disclosed. A memory status value held by latch circuitry in the memory protection device determines whether the memory is an enabled or a disabled state.
Arm Limited


08/20/15
20150234949 

Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a logical design, and a processor to execute a synthesis engine.
International Business Machines Corporation


08/20/15
20150234948 

Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The method includes performing a baseline synthesis to obtain a baseline physical design using timing constraints and an overall power budget.
International Business Machines Corporation


08/13/15
20150227744 

Attestation using a combined measurement and its constituent measurements


An attestation system for asserting and verifying assertions of a known-good state of a computer system is provided. The attestation system allows a challenger and a prover to conduct an attestation so that the challenger can verify an assertion of the prover.
Facebook, Inc.


08/06/15
20150220580 

Management, evaluation and visualization method, system and user interface for discussions and assertions


Various embodiments described herein relate to methods, systems, apparatus and computer-readable media for providing a graphical representation of a plurality of statements in a tree-like structure. At least a portion of the statements is displayed on a screen.

08/06/15
20150217926 

Hinged insulated container lid


An insulated container that includes a body and a lid assembly is described. The lid assembly may include a two-piece lid (e.g., two lids) connected with at least one linkage.
The Coleman Company, Inc.


07/30/15
20150213167 

Invariant sharing to speed up formal verification


Methods and apparatuses are described for sharing inductive invariants while performing formal verification of a circuit design. Specifically, some embodiments assume at least an inductive invariant for a property to be true while proving another property.
Synopsys, Inc.


07/30/15
20150212917 

Statistical power indication monitor


A statistical power indication monitor including a random pattern generator that generates random sample assertions of a sample signal, a total counter that counts a total number of the random sample assertions within a sample time interval, detect logic that provides a detection signal for each power indication signal that is asserted coincident with the sample signal, and counter logic that counts a number of assertions of each detection signal during the sample time interval. The assertion count of each power indication signal divided by the total count provides a statistical indication of power consumption of a corresponding system.
Freescale Semiconductor, Inc.


07/23/15
20150207804 

Media stream trust display


Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In particular, composite content having various content elements is rendered via a user interface of a browser or other application that supports web-based communications.
Microsoft Corporation


07/23/15
20150207462 

Wide common mode range sense amplifier


A device for comparing voltage levels of a pair of input signals is presented. The device may include a pre-amp circuit and a differential amplifier.
Apple Inc.


07/23/15
20150205706 

Graphical model for test case viewing, editing, and reporting


Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon.

07/23/15
20150205704 

Graphical model for test case viewing, editing, and reporting


Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon.

07/16/15
20150200924 

Redirect to inspection proxy using single-sign-on bootstrapping


An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user.
Cisco Technology, Inc.


07/16/15
20150199465 

Boundary latch and logic placement to satisfy timing constraints


Boundary timing in the design of an integrated circuit is facilitated by designating a subset of boundary latches in the circuit, and applying placement constraints to the boundary latches. Global placement is performed while maintaining the boundary latch placement constraints, and a timing driven placement is performed after implementing timing assertions.
International Business Machines Corporation


07/09/15
20150195261 

Secure session for a group of network nodes


Methods (500) of a network node (111) for creating and joining secure sessions for members (111-114) of a group of network nodes are provided. The methods comprise receiving an identity certificate and an assertion for the network node as well as a secret group key for the group.
Telefonaktiebolaget L M Ericsson (publ)


07/02/15
20150188906 

Multi-domain applications with authorization and authentication in cloud environment


A multi-domain application requiring sso and slo operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (mds) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (slos) on the domains of the multi-domain application and to invalidate the user sessions on the domains.

07/02/15
20150186783 

Using ontologies to comprehend regular expressions


Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. .
International Business Machines Corporation


07/02/15
20150186547 

Using ontologies to comprehend regular expressions


Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. .
International Business Machines Corporation


06/11/15
20150163251 

Identity assertion framework


Systems and methods for implementing an identity assertion framework to authenticate a user in a federation of security domains are provided. A first security token service associated with a first security domain is configured to receive a request for a first token from a device and issue the first token based on a first issuing policy of the first security domain.
Ebay Inc.


06/04/15
20150154104 

Continuous integration of business intelligence software


Methods for automatically testing a business intelligence artifact include authoring a business intelligence artifact selected from the group consisting of a report specification, an analysis cube, and a metadata model; creating an assertion to verify the proper functioning of the business intelligence artifact; and testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact to verify its proper functioning by determining whether the conditions of the assertion are satisfied upon execution of the business intelligence artifact in the business intelligence system.. .
Motio, Inc.


05/28/15
20150149671 

Systems and methods for biasing a bus


A bi-directional differential bus interface that includes a differential transmitter having a non-inverting terminal and an inverting terminal, a differential receiver having a non-inverting terminal and an inverting terminal, and a biasing circuit that is electrically coupled to the non-inverting terminal of the differential transmitter and the inverting terminal of the differential transmitter. The biasing circuit is configured to generate a voltage between the non-inverting terminal of the differential transmitter and the inverting terminal of the differential transmitter that is approximately 200 mv or more in response to assertion of a control signal received on a control input of the biasing circuit..
Schneider Electric It Corporation


05/14/15
20150135281 

Provisioning access to customer organization data in a multi-tenant system


Methods and systems are described for providing support representative access to applications deployed in an enterprise network environment. An access provisioning system defines a support user class in a user profile database for an application executed on an organization partition within the network.

05/14/15
20150134978 

Secure bios tamper protection mechanism


An apparatus including a rom, a selector, and a detector. The rom has a partitions, each stored as plaintext, and a encrypted digests, each comprising an encrypted version of a first digest associated with a corresponding one of the partitions.

05/14/15
20150134977 

Partition-based securing bios in a trusted computing system during execution


An apparatus including a rom, a selector, and a detector. The rom has partitions and encrypted digests.

05/14/15
20150134976 

Event-based securing bios in a trusted computing system during execution


An apparatus including a rom, an event detector, and a tamper detector. The rom has bios contents stored as plaintext, and an encrypted digest.

05/14/15
20150134975 

Secure bios mechanism in a trusted computing system


An apparatus including a rom and a microprocessor. The rom includes bios contents that are stored as plaintext and an encrypted digest.

05/07/15
20150127874 

Platform communication protocol


A host chipset heartbeat may be utilized, in some embodiments, to handle interrupts from external devices on a power efficient basis. The availability of the host chipset heartbeat may be signaled to external devices and those external devices may time their activities to a period of time when not only are resources available, but the assertion of the activity is advantageous because the host chipset is already transitioning from a lower power consumption state..
Intel Corporation


04/23/15
20150109030 

Calibrated output driver with enhanced reliability and density


An output driver configured to drive an output node includes a pull-down section having a plurality of legs and a pull-up section having a plurality of pull-up legs. Each leg and pull-up leg includes a data path and a calibration path.
Qualcomm Incorporated




Assertion topics: Social Networking, Social Network, Networking, Machine Learning, Repository, Clock Divider, High Speed, Graphics Processing Unit, Interactive, Breakpoint, Concurrent, Concurrency, Expressions, Deasserted, Storage Device

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.


3.4833

4544

469298 - 0 - 101