Images List Premium Download Classic

Assertion

Assertion-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Secure mobile client with assertions for access to service provider applications
Cisco Technology, Inc.
December 31, 2015 - N°20150381625

A software-as-a-service (saas) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more saas applications to access, and including an idp identifier for the saas application. The saas access control application includes software to be inserted into a network software stack of the client device and ...
Providing a guest with access to content of a social network
International Business Machines Corporation
December 31, 2015 - N°20150381545

Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the ...
Providing a guest with access to content of a social network
International Business Machines Corporation
December 31, 2015 - N°20150381524

Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the ...
Assertion Patent Pack
Download + patent application PDFs
Assertion Patent Applications
Download + Assertion-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Assertion-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Techniques to communicate with a controller for a non-volatile dual in-line memory module
December 31, 2015 - N°20150378841

Examples may include communicating with a controller for a non-volatile dual in-line memory module through a system management bus (smbus) interface. In some examples, selective assertion of bits maintained in registers accessible through the smbus interface may enable communication with the controller. The selective assertion may be based on a register map.
Boost converter stage switch controller
Cirrus Logic, Inc.
December 17, 2015 - N°20150364993

A low voltage lamp includes a boost converter stage and a load. The load may include low voltage light producing elements including low voltage light emitting diodes. The boost converter stage receives an electronic transformer output and includes an inductor coupled to a switch and a switch controller that receives one or more controller inputs. Inductor current may be returned ...
System and method for utilizing a logical graphical model for scenario analysis
Clados Management Llc
December 17, 2015 - N°20150363705

A system and method for utilizing a logical graphical model for data analysis are described. The system provides a “pgm authoring tool” that enables a user to employ a logical graphical model to create, edit, and browse the assertions and inferences in a probabilistic graphical model.
Assertion Patent Pack
Download + patent application PDFs
Assertion Patent Applications
Download + Assertion-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Assertion-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Methods and systems for authorizing web service requests
General Electric Company
December 03, 2015 - N°20150350212

Systems and methods for authorizing web service requests. In some embodiments, a computer-implemented method includes receiving a web service request having an authorization header and business code, authenticating a security assertion markup language (saml) token included in the authorization header and constructing a security context based on attributes of the saml token. The process also includes passing the security context ...
Method of identification, corresponding device and program
Ingenico Group
December 03, 2015 - N°20150348043

A method and device are provided for method for identifying a user for access to an article or a service. The method includes: presentation to a terminal, by the user to be identified, of a payment card; execution, by the terminal, of a payment transaction, the amount of which is zero; and when said payment transaction is executed without error, ...
Method and appartus for distributed power assertion
Apple Inc.
December 03, 2015 - N°20150346801

A method and an apparatus for a power assertion management are described. A power assertion indicator may be maintained for a device component having a power level. The power assertion indicator can indicate whether the power level of the device component is allowed to be lowered. A power assertion request may be sent from a first process to prevent lowering ...
Privacy enhanced key management for a web service provider using a converged security engine
Intel Corporation
November 26, 2015 - N°20150341332

In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the ...
Custom knowledgebases and sequence datasets
Battelle Memorial Institute
November 19, 2015 - N°20150331993

Illustrative embodiments of custom knowledgebases and sequence datasets, as well as related methods, are disclosed. In one illustrative embodiment, one or more computer-readable media may comprise a custom knowledgebase and an associated sequence dataset. The custom knowledgebase may comprise a plurality of assertions that have been automatically extracted from a plurality of publications, where each of the plurality of assertions ...
Independent identity management systems
Interdigital Patent Holdings Inc.
November 05, 2015 - N°20150319156

Systems, methods and apparatus embodiments are described herein for authenticating a user and/or a user equipment (ue). For example, a user and/or ue may request access to a service controlled by a service provider (sp). The user may be authenticated by an identity provider (idp), producing a result. A user assertion may be provided to the sp, and ...
Privacy verification tool
Facebook, Inc.
October 29, 2015 - N°20150310225

Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool. The verification tool uses the expressed privacy policies along with language-level assumptions and assertions in the verification process. For example, high-level ...
Assertion Patent Pack
Download + patent application PDFs
Assertion Patent Applications
Download + Assertion-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Assertion-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and system for evaluating user assertions
October 22, 2015 - N°20150302357

The various embodiments herein disclose a method and system for enabling users to make assertions of suitability and have other users evaluate those assertions. According to an embodiment of the present invention, the method comprises steps of receiving an application along with a guarantee from an applicant. Herein, the application corresponds to one or more requirements; authenticating, by a guarantee ...
Traffic on-boarding for acceleration through out-of-band security authenticators
Akamai Technologies, Inc.
October 01, 2015 - N°20150281204

A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client ...
Method for verifying the authenticity of a terminal, corresponding device and program
Compagnie Industrielle Et Financiere D'ingenierie "ingenico"
October 01, 2015 - N°20150278792

A method is provided for verifying an authenticity of a payment terminal, implemented by using of a device for verifying authenticity. The method includes: transmitting to the payment terminal a request for obtaining a piece of identification data by using of a contactless communications interface; receiving a response, through said contactless communications interface and coming from the payment terminal, to ...
Clock verification
Imagination Technologies Limited
October 01, 2015 - N°20150278416

Methods and systems for verifying a derived clock using assertion-based verification. The method comprises counting the number of full or half cycles of a fast clock that occur between the rising edge and the falling edge of a slow clock (i. E. During the on phase of the slow clock); counting the number of full or half cycles of the ...
Method and device for operating a vehicle application
Continental Automotive Gmbh
September 24, 2015 - N°20150271185

In a method, each received vehicle-to-x message is at least partly forwarded to at least one application of a vehicle depending on specified information of the vehicle-to-x message (n), the vehicle-to-x message comprising a digital signature. Digital signatures of the vehicle-to-x messages relevant to the decision that a specified action of the application should be carried out are validated depending ...
Receiver circuit and operating method of the same
Synaptics Display Devices Kk
September 17, 2015 - N°20150262547

A receiver circuit includes a clk_lp circuit, a clk_hs circuit, a data_lp circuit, a data_hs circuit and a malfunction detection circuit. The clk_lp circuit and the clk_hs circuit are connected to the clock lane. The data_lp circuit and the data_hs circuit are connected to the data lane. The malfunction detection circuit is ...
Logical data flow mapping rules for (sub) graph isomorphism in a cluster computing environment
Concurrent, Inc.
September 17, 2015 - N°20150261881

A system and a method are disclosed for transforming cluster computing resources of a target system to match a user defined logical data flow so data processing between the source and target are functionally equivalent. The source logical dataflow is compatibly mapped to a target directed acyclic graph that represents the cluster computing resources. A series of subgraph assertion and ...
Systems and methods for providing secure access to local network devices
Symantec Corporation
September 03, 2015 - N°20150249645

A computer-implemented method for providing secure access to local network devices may include (1) identifying a local area network that provides internet connectivity to at least one device within the local area network, (2) obtaining, from an identity assertion provider, (i) a shared secret for authenticating the identity of a guest user of the device and (ii) a permission for the guest ...
Loading