Popular terms

Assertion topics
Social Networking
Social Network
Networking
Machine Learning
Repository
Clock Divider
High Speed
Graphics Processing Unit
Interactive
Breakpoint
Concurrent
Concurrency
Expressions
Deasserted
Storage Device

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Assertion patents



      
           
This page is updated frequently with new Assertion-related patent applications.



Date/App# patent app List of recent Assertion-related patents
02/04/16
20160030840 
 Stack roster fantasy sports game and platform patent thumbnailnew patent Stack roster fantasy sports game and platform
A method and system for playing a fantasy sport competition among a plurality of users, includes instructions stored on a non-transitory computer readable medium for transmitting user selections to suitably order players in the user roster. Any user requests to commence a draft.
Sport Gamet International Llc


01/28/16
20160029318 
 Method for waking a data transceiver through data reception patent thumbnailMethod for waking a data transceiver through data reception
A method for managing power in a system, in which the system may include a first device configured to transmit serial data and a second device, coupled to the first device. The second device may include a transceiver and interrupt logic, and may be configured to activate the interrupt logic and enable a reduced power mode for the transceiver.
Apple Inc.


01/28/16
20160028708 
 Digital credential with embedded authentication instructions patent thumbnailDigital credential with embedded authentication instructions
Methods and systems are provided for sending messages in a security system. In particular, a new message syntax can include one or more positive assertions that may be verified.
Assa Abloy Ab


12/31/15
20150381625 
 Secure mobile client with assertions for access to service provider applications patent thumbnailSecure mobile client with assertions for access to service provider applications
A software-as-a-service (saas) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more saas applications to access, and including an idp identifier for the saas application. The saas access control application includes software to be inserted into a network software stack of the client device and software configured to serve as an identity provider for assertions.
Cisco Technology, Inc.


12/31/15
20150381545 
 Providing a guest with access to content of a social network patent thumbnailProviding a guest with access to content of a social network
Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. .
International Business Machines Corporation


12/31/15
20150381524 
 Providing a guest with access to content of a social network patent thumbnailProviding a guest with access to content of a social network
Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. .
International Business Machines Corporation


12/31/15
20150379108 
 Data mining in a business intelligence document patent thumbnailData mining in a business intelligence document
A business intelligence document provides functionality for testing a hypothesis on aggregated data in a business intelligence document (e.g., a spreadsheet-like document), wherein one or more of the input data values and transformation properties are designated as constrained (e.g., invariant or constrained within a range, set, enumeration, or domain). The hypothesis, which is articulated as a data mining assertion, is input through the user interface of the business intelligence document (e.g., via an expression interface or properties of a row, column, or cell) and solved over the aggregated data.
Microsoft Technology Licensing, Llc


12/31/15
20150378841 
 Techniques to communicate with a controller for a non-volatile dual in-line memory module patent thumbnailTechniques to communicate with a controller for a non-volatile dual in-line memory module
Examples may include communicating with a controller for a non-volatile dual in-line memory module through a system management bus (smbus) interface. In some examples, selective assertion of bits maintained in registers accessible through the smbus interface may enable communication with the controller.

12/17/15
20150364993 
 Boost converter stage switch controller patent thumbnailBoost converter stage switch controller
A low voltage lamp includes a boost converter stage and a load. The load may include low voltage light producing elements including low voltage light emitting diodes.
Cirrus Logic, Inc.


12/17/15
20150363705 
 System and  utilizing a logical graphical model for scenario analysis patent thumbnailSystem and utilizing a logical graphical model for scenario analysis
A system and method for utilizing a logical graphical model for data analysis are described. The system provides a “pgm authoring tool” that enables a user to employ a logical graphical model to create, edit, and browse the assertions and inferences in a probabilistic graphical model..
Clados Management Llc


12/17/15
20150363481 

Systems, devices, and/or methods for managing information


Certain exemplary embodiments can provide a system, machine, device, manufacture, circuit, composition of matter, and/or user interface adapted for and/or resulting from, and/or a method and/or machine-readable medium comprising machine-implementable instructions for, activities that can comprise and/or relate to, automatically generating a story regarding a predetermined topic from a plurality of assertions.. .

12/03/15
20150350212 

Methods and systems for authorizing web service requests


Systems and methods for authorizing web service requests. In some embodiments, a computer-implemented method includes receiving a web service request having an authorization header and business code, authenticating a security assertion markup language (saml) token included in the authorization header and constructing a security context based on attributes of the saml token.
General Electric Company


12/03/15
20150348043 

Method of identification, corresponding device and program


A method and device are provided for method for identifying a user for access to an article or a service. The method includes: presentation to a terminal, by the user to be identified, of a payment card; execution, by the terminal, of a payment transaction, the amount of which is zero; and when said payment transaction is executed without error, issuing an assertion of identification leading to access to the article or service..
Ingenico Group


12/03/15
20150346801 

Method and appartus for distributed power assertion


A method and an apparatus for a power assertion management are described. A power assertion indicator may be maintained for a device component having a power level.
Apple Inc.


11/26/15
20150341332 

Privacy enhanced key management for a web service provider using a converged security engine


In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.
Intel Corporation


11/19/15
20150331993 

Custom knowledgebases and sequence datasets


Illustrative embodiments of custom knowledgebases and sequence datasets, as well as related methods, are disclosed. In one illustrative embodiment, one or more computer-readable media may comprise a custom knowledgebase and an associated sequence dataset.
Battelle Memorial Institute


11/05/15
20150319156 

Independent identity management systems


Systems, methods and apparatus embodiments are described herein for authenticating a user and/or a user equipment (ue). For example, a user and/or ue may request access to a service controlled by a service provider (sp).
Interdigital Patent Holdings Inc.


10/29/15
20150310225 

Privacy verification tool


Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool.
Facebook, Inc.


10/22/15
20150302358 

Method and enabling a user assertion service for visitors to web pages


A method and user interface object for invoking a user assertion service to operate with a web page are disclosed. Consistent with one embodiment of the invention, a web portal hosting a user assertion service enables an evaluator to include a user interface element on his requirement posting.

10/22/15
20150302357 

Method and system for evaluating user assertions


The various embodiments herein disclose a method and system for enabling users to make assertions of suitability and have other users evaluate those assertions. According to an embodiment of the present invention, the method comprises steps of receiving an application along with a guarantee from an applicant.

10/01/15
20150281204 

Traffic on-boarding for acceleration through out-of-band security authenticators


A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource.
Akamai Technologies, Inc.


10/01/15
20150278792 

Method for verifying the authenticity of a terminal, corresponding device and program


A method is provided for verifying an authenticity of a payment terminal, implemented by using of a device for verifying authenticity. The method includes: transmitting to the payment terminal a request for obtaining a piece of identification data by using of a contactless communications interface; receiving a response, through said contactless communications interface and coming from the payment terminal, to said request for obtaining a piece of identification data; comparing a field of said response with at least one piece of pre-recorded identification data; when the field includes a piece of identification data identical to said at least one piece of pre-recorded identification data, for issuing an assertion of authenticity of said payment terminal; when the field comprises a piece of identification data different from said at least one piece of pre-recorded identification data, issuing a piece of information on absence of authentication of the payment terminal..
Compagnie Industrielle Et Financiere D'ingenierie "ingenico"


10/01/15
20150278416 

Clock verification


Methods and systems for verifying a derived clock using assertion-based verification. The method comprises counting the number of full or half cycles of a fast clock that occur between the rising edge and the falling edge of a slow clock (i.e.
Imagination Technologies Limited


09/24/15
20150271185 

Method and device for operating a vehicle application


In a method, each received vehicle-to-x message is at least partly forwarded to at least one application of a vehicle depending on specified information of the vehicle-to-x message (n), the vehicle-to-x message comprising a digital signature. Digital signatures of the vehicle-to-x messages relevant to the decision that a specified action of the application should be carried out are validated depending on a decision signal provided in response to the vehicle-to-x messages being forwarded to the at least one application and which represents an assertion as to whether the vehicle-to-x messages comprise data causing the action to be carried out.
Continental Automotive Gmbh


09/17/15
20150262547 

Receiver circuit and operating the same


A receiver circuit includes a clk_lp circuit, a clk_hs circuit, a data_lp circuit, a data_hs circuit and a malfunction detection circuit. The clk_lp circuit and the clk_hs circuit are connected to the clock lane.
Synaptics Display Devices Kk


09/17/15
20150261881 

Logical data flow mapping rules for (sub) graph isomorphism in a cluster computing environment


A system and a method are disclosed for transforming cluster computing resources of a target system to match a user defined logical data flow so data processing between the source and target are functionally equivalent. The source logical dataflow is compatibly mapped to a target directed acyclic graph that represents the cluster computing resources.
Concurrent, Inc.


09/03/15
20150249645 

Systems and methods for providing secure access to local network devices


A computer-implemented method for providing secure access to local network devices may include (1) identifying a local area network that provides internet connectivity to at least one device within the local area network, (2) obtaining, from an identity assertion provider, (i) a shared secret for authenticating the identity of a guest user of the device and (ii) a permission for the guest user to access the device from outside the local area network, (3) storing the shared secret and the permission within the local area network, (4) receiving, via the internet connectivity, a request by the guest user from outside the local area network to access the device, and (5) providing access to the device in response to validating the request based on the shared secret and the permission. Various other methods and systems are also disclosed..
Symantec Corporation


08/27/15
20150244706 

Security object creation, validation, and assertion for single sign on authentication


A security object creation and validation system provides an additional factor of authentication. An authentication system as described herein provides secure two-factor authentication, such as for it resources in an organization.
Secureauth Corporation


08/27/15
20150242541 

Assertion extraction from design and its signal traces


Groups of signals in an electronic design for which interesting assertions, such as assert, assume and cover properties, can be generated are identified. A sliding temporal window of fixed depth is used to sample unique present and past value combinations of signals in the signals groups generated by one or more simulations or emulations.
Synopsys, Inc.


08/27/15
20150242331 

Controlling access to a memory


A memory protection device for controlling access to a memory and a method of controlling access to a memory are disclosed. A memory status value held by latch circuitry in the memory protection device determines whether the memory is an enabled or a disabled state.
Arm Limited


08/20/15
20150234949 

Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a logical design, and a processor to execute a synthesis engine.
International Business Machines Corporation


08/20/15
20150234948 

Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The method includes performing a baseline synthesis to obtain a baseline physical design using timing constraints and an overall power budget.
International Business Machines Corporation


08/13/15
20150227744 

Attestation using a combined measurement and its constituent measurements


An attestation system for asserting and verifying assertions of a known-good state of a computer system is provided. The attestation system allows a challenger and a prover to conduct an attestation so that the challenger can verify an assertion of the prover.
Facebook, Inc.


08/06/15
20150220580 

Management, evaluation and visualization method, system and user interface for discussions and assertions


Various embodiments described herein relate to methods, systems, apparatus and computer-readable media for providing a graphical representation of a plurality of statements in a tree-like structure. At least a portion of the statements is displayed on a screen.

08/06/15
20150217926 

Hinged insulated container lid


An insulated container that includes a body and a lid assembly is described. The lid assembly may include a two-piece lid (e.g., two lids) connected with at least one linkage.
The Coleman Company, Inc.


07/30/15
20150213167 

Invariant sharing to speed up formal verification


Methods and apparatuses are described for sharing inductive invariants while performing formal verification of a circuit design. Specifically, some embodiments assume at least an inductive invariant for a property to be true while proving another property.
Synopsys, Inc.


07/30/15
20150212917 

Statistical power indication monitor


A statistical power indication monitor including a random pattern generator that generates random sample assertions of a sample signal, a total counter that counts a total number of the random sample assertions within a sample time interval, detect logic that provides a detection signal for each power indication signal that is asserted coincident with the sample signal, and counter logic that counts a number of assertions of each detection signal during the sample time interval. The assertion count of each power indication signal divided by the total count provides a statistical indication of power consumption of a corresponding system.
Freescale Semiconductor, Inc.


07/23/15
20150207804 

Media stream trust display


Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In particular, composite content having various content elements is rendered via a user interface of a browser or other application that supports web-based communications.
Microsoft Corporation


07/23/15
20150207462 

Wide common mode range sense amplifier


A device for comparing voltage levels of a pair of input signals is presented. The device may include a pre-amp circuit and a differential amplifier.
Apple Inc.


07/23/15
20150205706 

Graphical model for test case viewing, editing, and reporting


Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon.

07/23/15
20150205704 

Graphical model for test case viewing, editing, and reporting


Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a connector, which couples the first icon and the second icon.

07/16/15
20150200924 

Redirect to inspection proxy using single-sign-on bootstrapping


An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user.
Cisco Technology, Inc.


07/16/15
20150199465 

Boundary latch and logic placement to satisfy timing constraints


Boundary timing in the design of an integrated circuit is facilitated by designating a subset of boundary latches in the circuit, and applying placement constraints to the boundary latches. Global placement is performed while maintaining the boundary latch placement constraints, and a timing driven placement is performed after implementing timing assertions.
International Business Machines Corporation


07/09/15
20150195261 

Secure session for a group of network nodes


Methods (500) of a network node (111) for creating and joining secure sessions for members (111-114) of a group of network nodes are provided. The methods comprise receiving an identity certificate and an assertion for the network node as well as a secret group key for the group.
Telefonaktiebolaget L M Ericsson (publ)


07/02/15
20150188906 

Multi-domain applications with authorization and authentication in cloud environment


A multi-domain application requiring sso and slo operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (mds) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (slos) on the domains of the multi-domain application and to invalidate the user sessions on the domains.

07/02/15
20150186783 

Using ontologies to comprehend regular expressions


Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. .
International Business Machines Corporation


07/02/15
20150186547 

Using ontologies to comprehend regular expressions


Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. .
International Business Machines Corporation


06/11/15
20150163251 

Identity assertion framework


Systems and methods for implementing an identity assertion framework to authenticate a user in a federation of security domains are provided. A first security token service associated with a first security domain is configured to receive a request for a first token from a device and issue the first token based on a first issuing policy of the first security domain.
Ebay Inc.


06/04/15
20150154104 

Continuous integration of business intelligence software


Methods for automatically testing a business intelligence artifact include authoring a business intelligence artifact selected from the group consisting of a report specification, an analysis cube, and a metadata model; creating an assertion to verify the proper functioning of the business intelligence artifact; and testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact to verify its proper functioning by determining whether the conditions of the assertion are satisfied upon execution of the business intelligence artifact in the business intelligence system.. .
Motio, Inc.


05/28/15
20150149671 

Systems and methods for biasing a bus


A bi-directional differential bus interface that includes a differential transmitter having a non-inverting terminal and an inverting terminal, a differential receiver having a non-inverting terminal and an inverting terminal, and a biasing circuit that is electrically coupled to the non-inverting terminal of the differential transmitter and the inverting terminal of the differential transmitter. The biasing circuit is configured to generate a voltage between the non-inverting terminal of the differential transmitter and the inverting terminal of the differential transmitter that is approximately 200 mv or more in response to assertion of a control signal received on a control input of the biasing circuit..
Schneider Electric It Corporation


05/14/15
20150135281 

Provisioning access to customer organization data in a multi-tenant system


Methods and systems are described for providing support representative access to applications deployed in an enterprise network environment. An access provisioning system defines a support user class in a user profile database for an application executed on an organization partition within the network.

05/14/15
20150134978 

Secure bios tamper protection mechanism


An apparatus including a rom, a selector, and a detector. The rom has a partitions, each stored as plaintext, and a encrypted digests, each comprising an encrypted version of a first digest associated with a corresponding one of the partitions.

05/14/15
20150134977 

Partition-based securing bios in a trusted computing system during execution


An apparatus including a rom, a selector, and a detector. The rom has partitions and encrypted digests.

05/14/15
20150134976 

Event-based securing bios in a trusted computing system during execution


An apparatus including a rom, an event detector, and a tamper detector. The rom has bios contents stored as plaintext, and an encrypted digest.

05/14/15
20150134975 

Secure bios mechanism in a trusted computing system


An apparatus including a rom and a microprocessor. The rom includes bios contents that are stored as plaintext and an encrypted digest.

05/07/15
20150127874 

Platform communication protocol


A host chipset heartbeat may be utilized, in some embodiments, to handle interrupts from external devices on a power efficient basis. The availability of the host chipset heartbeat may be signaled to external devices and those external devices may time their activities to a period of time when not only are resources available, but the assertion of the activity is advantageous because the host chipset is already transitioning from a lower power consumption state..
Intel Corporation


04/23/15
20150109030 

Calibrated output driver with enhanced reliability and density


An output driver configured to drive an output node includes a pull-down section having a plurality of legs and a pull-up section having a plurality of pull-up legs. Each leg and pull-up leg includes a data path and a calibration path.
Qualcomm Incorporated


04/16/15
20150106617 

Mechanisms to use network session identifiers for software-as-a-service authentication


Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (saas) server. A network access device receives a request from a client device to establish a network session and transfers identity information of the subject, the client device and the network session to a session directory database.
Cisco Technology, Inc.


04/02/15
20150091622 

System and enabling maximum performance operation within an extended ambient temperature range


A system method of initializing operation of a semiconductor device including detecting de-assertion of an external reset signal while the semiconductor device in a reset state, monitoring a temperature level of the semiconductor device, and while the temperature level is below a predetermined minimum operating temperature level that allows the semiconductor device to operate at a maximum performance level, keeping the semiconductor device in the reset state and asserting at least one operating parameter on the semiconductor device at an elevated level to generate heat on the semiconductor device, and releasing the reset condition when the temperature level is at least the predetermined minimum operating temperature level. The operating parameter may be clock frequency or supply voltage level or a combination of both.
Freescale Semiconductor, Inc.


03/19/15
20150082263 

Merit-based characterization of assertions in hardware design verification


A system is configured to generate assertions for verification of an integrated circuit hardware design expressed at a register transfer level (rtl) for variables of interest, each including an antecedent and a consequent. A relative importance score for the variables is determined by characterizing respective variables by a level of importance with respect to a target variable of the consequent.
The Board Of Trustees Of The University Of Illinois


03/12/15
20150074809 


A method for tracking machines on a network of computers includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers.
Threatmetrix Pty Ltd


03/12/15
20150074782 

Secure sso subscriber accessing service from outside of home network


When a ue (10) transits from a home mno (20) to another network (visited network) (30), the visited network (30) or the ue (10) notifies the home mno (20) of ue's location. The home mno (20) validates the ue's authenticity and its location, and sends an assertion to the sp (40) via the visited network (30) or the ue (10).
Nec Corporation


02/26/15
20150058509 

Electronic apparatus and port control method


A method of an embodiment enables locking of downstream ports of a usb hub controller in an electronic apparatus. The method includes the determination step, the assertion step and the lock step.
Kabushiki Kaisha Toshiba


02/05/15
20150040190 

System and proxying federated authentication protocols


A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.. .
Duo Security, Inc.


02/05/15
20150039896 

System and pool-based identity generation and use for service access


A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link..
Ebay Inc.


01/29/15
20150033305 

Methods and systems for secure and reliable identity-based computing


The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for identity firewalls; awareness managers; contextual purpose firewall frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like..
Advanced Elemental Technologies, Inc.


01/22/15
20150022218 

Techniques and circuits for testing a virtual power supply at an integrated circuit device


A power grid provides power to one or more modules of an integrated circuit device via a virtual power supply signal. A test module is configured to respond to assertion of a test signal so that, when the power grid is working properly and is not power gated, an output of the test module matches the virtual power supply.
Advanced Micro Devices, Inc.


01/15/15
20150019571 

Method for population of object property assertions


Relay of information from technical documentation by contact center workers to assist clients is limited by industry standard storage formats and query mechanisms. A method is disclosed for processing technical documents and tagging them against a telecom hardware domain ontology.
Innovatia Inc.


01/01/15
20150007291 

Authentication proxy agent


An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a proxy agent configured to interact with an identity provider to authenticate the client on behalf of the client, using the credentials.
Bmc Software, Inc.


01/01/15
20150007263 

Maintaining privacy in a multi-tenant cloud service participating in a federated identity platform


Embodiments conceal or obfuscate tenancy in a multi-tenant cloud service participating in a federated identity platform. A cloud service receives a request for a document from a first entity.
Vmware, Inc.


01/01/15
20150002611 

Computer system employing speech recognition for detection of non-speech audio


A computer system executing a computer audio application such as video conferencing applies audio detection and speech recognition to an input audio stream to generate respective audio detection and speech recognition signals. A function is applied to the audio detection and speech recognition signals to generate a non-speech audio detection signal identifying presence of non-speech audio in the input audio stream when the audio detection signal is asserted and the speech recognition signal is not asserted.
Citrix Systems, Inc.


12/18/14
20140369139 

Apparatus and a erasing data stored in a memory device


The present invention provides an apparatus and method for erasing data in a memory device comprising an array of memory cells, and configured to operate from a clock signal. The apparatus includes erase circuitry, responsive to receipt of an erase signal in an asserted state, to perform a forced write operation independently of the clock signal in respect of each memory cell within a predetermined erase region of said array.
Arm Limited


12/11/14
20140365210 

Systems and methods for processing patient information


Systems and methods described herein are for transforming narrative content into structured output. In some embodiments the narrative content is processed using a natural language processing (nlp) engine and a clinical model.

12/11/14
20140362263 

Image sensor with noise reduction


Systems and methods are disclosed for reducing reset noise in an image sensor. Voltage on the column read out is sensed during reset.

11/27/14
20140351775 

System, method, and computer program product for providing a debugger using a common hardware database


A hardware model database is identified which stores a graph-based common representation of a hardware design that includes hardware module nodes each representative of a unique module of the hardware design and associated with one or more instances of the unique module. Additionally, a signal dump resulting from a simulation of a logic code model of the hardware design is identified.

11/20/14
20140344173 

System and creating executable policy rules for execution on rules-based engines


A system and method of availing executable rules for performing a government regulation compliance review using a rules-based engine may include encoding assertions into a computer-executable format. The assertions may be converted from the computer-executable format to a conventional rules-based format.

11/20/14
20140344005 

System and providing a documentary audit trail in complying with government regulations


A system and method of establishing a documentary audit trail for a government regulatory compliance review may include accessing a set of assertions derived from government regulations. Subsets of the assertions may be associated with ordered steps in a workflow.

11/13/14
20140337934 

System and methods for access control based on a user identity


System and methods for access control in a universal plug and play (upnp) network are based on a user identity. A control point has an identity assertion capability for identifying a user.

11/06/14
20140330586 

Systems and methods for processing patient information


Systems and methods described herein are for transforming narrative content into structured output. In some embodiments the narrative content is processed using a natural language processing (nlp) engine and a clinical model.

11/06/14
20140327937 

Microformat for unified printing of web content


Example embodiments relate to a microformat for unified printing of web content. In example embodiments, a system obtains web content that is displayed in a web browser, where the web content includes meta tags that specify print property assertions and print property intents.

10/30/14
20140325463 

Integrated circuit design verification through forced clock glitches


A technique for determining whether an integrated circuit design is susceptible to glitches includes identifying storage elements in an original register-transfer level (rtl) file of the integrated circuit design and identifying clock signals for each of the storage elements in the original rtl file. The technique also includes generating respective assertions for each of the identified clock signals and identifying potential glitchy logic in respective clock paths for each of the identified clock signals.

10/30/14
20140324257 

System and controlling the transmission of high voltage current to an electric motor in an electric vehicle


A system for controlling the transmission of high voltage current to an electric motor in an electric vehicle having a torque control module which controls high voltage power to the electric motor and a powertrain control module. The powertrain control module is connected to the torque control module via a low voltage enabling electrical conduit and a high voltage enabling electrical conduit.

10/23/14
20140317044 

Method and device for real-time knowledge processing based on an ontology with temporal extensions


Embodiments are directed towards a method and a computer server for receiving assertions, wherein an assertion can have a functional property such that for a given subject and a given property the object has a single value at any time, maintaining a knowledge base that includes (1) a history table that stores previously received assertions, and (2) a snapshot table that stores currently valid assertions, maintaining a snapshot cache in memory that stores a subset of the assertions in the snapshot table, initiating a processing cycle, selecting an assertion for processing, generating an assertion tuple that corresponds to the selected assertion, determining that the property of the selected assertion is functional, writing a retraction tuple to the history table, writing the assertion tuple to the snapshot table; and writing the assertion tuple to the history table.. .

10/16/14
20140310826 

Mesh grid protection system


A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid.

10/16/14
20140310540 

Interrupt based power state management


A method and apparatus for power managed interrupt handling is disclosed. In one embodiment, a system includes one or more agents that may invoke an interrupt request.

10/16/14
20140306896 

Method and apparatus pertaining to dynamically determining entered telephone numbers


As keys of the keyboard of a portable communication device are asserted, the device dynamically determines at least a portion of a corresponding telephone number to present on the device's display by, at least in part, considering likelihoods of differing explicit and implicit interpretations of these key assertions. By one approach this can comprise according a likelihood advantage to an explicit interpretation of one or more of the key assertions and/or implicit interpretations of such key assertions.

10/09/14
20140304776 

Methods and managing network traffic


Methods, apparatus, and computer readable storage medium for authenticating assertions of a source are disclosed. In one aspect, a method for authenticating an assertion of a source in an environment of distributed control include receiving a notification of the assertion; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, determining an assertion authenticator for the entity based on a second trusted public record, determining one or more assertions of the source from the assertion authenticator, and authenticating the assertion based on the determined one or more assertions..

10/02/14
20140297356 

System and customer onboarding


A system and method of performing customer onboarding may include accessing business data derived from compliance documents of a potential customer in a nosql database. Grouped assertions in a computer-executable format may be caused to be applied to the business data in a sequence.

10/02/14
20140294204 

Audio amplifier mode transition


An audio amplifier is to transition between a power-down mode and an active mode, based on assertion and deassertion of a power down signal. A power down control module is to selectively assert and deassert the power down signal to the audio amplifier.

09/25/14
20140288910 

System, causal implication analysis in biological networks


Described are methods, systems and apparatus for hypothesizing a biological relationship in a biological system. A database of biological assertions is provided consisting of biological elements, relationships among the biological elements, and relationship descriptors characterizing the properties of the elements and relationships.

09/25/14
20140286649 

Signal level detect circuit with reduced loss-of-signal assertion delay


A signal level detect circuit configured to assess an input signal with varying amplitude signal levels and to generate an indicator signal includes an input circuit configured to receive the input signal and to process the input signal, the input circuit including a first node on which the input signal is sampled; a comparator configured to compare the processed input signal to a signal level threshold and generate a comparator output signal; and an active discharge circuit configured to provide a first discharge current to the first node in response to the comparator output signal. The comparator output signal changes from a low output state to a high output state in response to the comparator input signal, and the active discharge circuit generates the first discharge current to discharge the sampled input signal on the first node after the comparator output signal changes to the high output state..

09/18/14
20140282903 

Managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media


Embodiments include managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media. In one embodiment, a method for managing idps comprises selecting, by a webrtc client executing on a computing device, one or more preferred idp identifiers indicated by one or more preferences from a plurality of idp identifiers corresponding to a plurality of idps for providing identity assertions during an establishment of a webrtc interactive flow.

09/18/14
20140282837 

Privacy verification tool


Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool.

09/18/14
20140282321 

System and a hybrid clock domain crossing verification


A method of hybrid clock domain crossing (cdc) verification includes receiving a design or an integrated circuit (ic) design constraints. Static cdc verification is performed, including structural and functional verification.



Assertion topics: Social Networking, Social Network, Networking, Machine Learning, Repository, Clock Divider, High Speed, Graphics Processing Unit, Interactive, Breakpoint, Concurrent, Concurrency, Expressions, Deasserted, Storage Device

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.


9.3633

4544

468976 - 0 - 101