Follow us on Twitter
twitter icon@FreshPatents


Assertion patents

      

This page is updated frequently with new Assertion-related patent applications.




 Static analysis based efficient elimination of false positive patent thumbnailStatic analysis based efficient elimination of false positive
A method and a system is disclosed herein for model checker based efficient elimination of false positives from static analysis warnings generated during static analysis of an application code. The system computes complete-range non-deterministic value variables (cnv variables) that are based on data flow analysis or static approximation of execution paths by control flow paths.
Tata Consultancy Services Limited


 Characteristics of security associations patent thumbnailCharacteristics of security associations
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a wtru, may request access to a service controlled by an access control entity (ace).
Interdigitial Patent Holdings, Inc.


 Input buffer with selectable hysteresis and speed patent thumbnailInput buffer with selectable hysteresis and speed
A buffer provides a signal at an output node as a function of an input signal. First and second buffer stages have respective current conduction paths for asserting the output signal.
Freescale Semiconductor, Inc.


 Usb power delivery dead-battery control patent thumbnailUsb power delivery dead-battery control
A method of power delivery. Port controllers each include a state machine, an io pin, a receptacle supply pin receiving power from a receptacle, and a gate driver pin coupled to a control node of a power path switch each having an output coupled to a load.
Texas Instruments Incorporated


 Image sensor with noise reduction patent thumbnailImage sensor with noise reduction
Systems and methods are disclosed for reducing reset noise in an image sensor. Voltage on the column read out is sensed during reset.
Invisage Technologies, Inc.


 Fuse-enabled secure bios mechanism with override feature patent thumbnailFuse-enabled secure bios mechanism with override feature
An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), a tamper detector, a random number generator, a jtag control chain, a fuse, a machine specific register, and an access controller.
Via Technologies, Inc.


 Fuse-enabled secure bios mechanism in a trusted computing system patent thumbnailFuse-enabled secure bios mechanism in a trusted computing system
An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), a tamper detector, a random number generator, a jtag control chain, a fuse, and an access controller.
Via Technologies, Inc.


 Jtag-based secure bios mechanism in a trusted computing system patent thumbnailJtag-based secure bios mechanism in a trusted computing system
An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), a tamper detector, a random number generator, and a jtag control chain.
Via Technologies, Inc.


 Programmable secure bios mechanism in a trusted computing system patent thumbnailProgrammable secure bios mechanism in a trusted computing system
An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), a tamper detector, a random number generator, and a jtag control chain.
Via Technologies, Inc.


 Insulating synchronous rectifying dc/dc converter, synchronous rectifying controller, power supply using the same, power adapter and electronic device, and control  synchronous rectifying controller patent thumbnailInsulating synchronous rectifying dc/dc converter, synchronous rectifying controller, power supply using the same, power adapter and electronic device, and control synchronous rectifying controller
A synchronous rectifying controller on secondary side of insulating synchronous rectifying converter to control synchronous rectifying transistor, comprising: first comparator to compare drain voltage of the transistor with first negative threshold voltage, and assert set signal based on the comparison of them; second comparator to compare drain voltage with second negative threshold voltage, and assert reset signal based on the comparison of them; third comparator to compare drain voltage with third positive threshold voltage, and assert release signal based on the comparison of them; control circuit set in response to the assertion of the set signal and to adjust control pulse to have on level, and reset in response to the assertion of the reset signal and to adjust the control pulse to have off level; and driver to drive the transistor, wherein set operation of the control circuit is inhibited until the release signal is asserted.. .
Rohm Co., Ltd.


Trusted execution of an executable object on a local device

In one example embodiment, an electronic device is provided and configured to: acquire authentication data for an authorized user; store the authentication data in an enclave; acquire identification data for a potential user; and compare, in the enclave, the identification data to the authentication data for recognizing if the potential user is the authorized user. In another embodiment, a server is provided and includes at least one processor; at least one memory; at least one driver, where the server is configured to: receive assertion data from an electronic device, where the assertion includes an authentication signing key and results from a comparison of acquired data and reference data; and determine if the assertion data is valid by: comparing the results to a threshold; and comparing the authentication signing key to an authentication signing key assigned to the electronic device..
Mcafee, Inc.

Continuous integration of business intelligence software

Methods for automatically testing a business intelligence artifact in a business intelligence system include authoring a business intelligence artifact; creating an assertion with conditions to verify the proper functioning of the business intelligence artifact; testing, with an automated agent interfaced with the business intelligence system, the business intelligence artifact to verify its proper functioning by determining whether the conditions of the assertion are satisfied; and reporting if the conditions of the assertion are not satisfied.. .
Motio, Inc.

System and proxying federated authentication protocols

A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.. .
Duo Security, Inc.

Communication apparatus, control apparatus, and communication system

A communication apparatus for transmitting and receiving data is configured to: store assertion information in which a failure detection condition is registered, the failure detection condition including information for identifying data that is not to be received during normal operation; refer to the assertion information when data has been received from another communication apparatus; judge whether or not the received data satisfies the failure detection condition registered in the assertion information; and detect a failure when it is judged that the received data satisfies the failure detection condition registered in the assertion information.. .
Hitachi Metals, Ltd.

System and managing and composing verification engines

A system and method for managing and composing verification engines and simultaneously applying such compositions to verify properties with design constraints allocates computing resources to verification engines based upon properties to be checked and optionally a user-specified budget. The verification engines are run in order to verify a received register transfer level (rtl) design description of a circuit according to user-specified assertions and constraints received by the system.
Synopsys, Inc

Personal knowledge graph population from declarative user utterances

An “utterance-based knowledge tool” monitors user utterances (e.g., user speech or text inputs) to identify relevant statements of facts in declarative utterances of a user. A semantic parser is applied to each statement of facts to parse assertions comprising instances of two or more entities and relations between those entities.
Microsoft Technology Licensing, Llc

Method and enabling access to applications integrated with a visited network

An application server receives a request for service from a wireless transmit/receive unit (wtru) associated with a home network that includes a home subscriber server (hss) and a bootstrapping server function (bsf) coupled via a zh reference point. The application server authenticates the wtru at least in part by (i) redirecting the wtru to an identity provider co-located with a network application function (idp/naf) and coupled to the bsf via a zn reference point and (ii) receiving an assertion from the wtru that the idp/naf has authenticated the wtru based on user security settings retrieved from the bsf by the idp/naf over the zn reference point.
Interdigital Patent Holdings, Inc

Lifting of bounded liveness counterexamples to concrete liveness counterexamples

A trace of a bounded liveness failure of a system component is received, by one or more processors, along with fairness constraints and liveness assertion conditions. One or more processors generate randomized values for unassigned input values and register values, of the trace, and simulate traversal of each of a sequence of states of the trace.
International Business Machines Corporation

Lifting of bounded liveness counterexamples to concrete liveness counterexamples

A trace of a bounded liveness failure of a system component is received, by one or more processors, along with fairness constraints and liveness assertion conditions. One or more processors generate randomized values for unassigned input values and register values, of the trace, and simulate traversal of each of a sequence of states of the trace.
International Business Machines Corporation

Circuits and methods providing clock frequency adjustment in response to supply voltage changes

Methods, systems, and circuits for providing compensation for voltage variation are disclosed. A system includes: a voltage comparator configured to assert a control signal in response to detecting that one or more of power supply voltages droops below a threshold amount; a phase locked loop (pll) configured to divide an output frequency for the pll in response to the assertion of the control signal; a plurality of voltage sensors corresponding to the plurality of power supply voltages, the voltage sensors configured to output respective digital signals indicative of a voltage level of its corresponding power supply voltage; and a control circuit configured to control an oscillator frequency in the pll during the open-loop mode responsive to the respective digital signals..
Qualcomm Incorporated

Methods and generating and using security assertions associated with containers in a computing environment

Methods and apparatus are disclosed to generate a security assertion document associated with a container image, and to use the security assertion document to determine whether a container image is suitable for use to assemble a corresponding container for execution in a host environment. In an example method, the generated security assertion document includes a security assertion resulting from an assessed policy rule.
Vmware, Inc.

Ultra-low power long range transceiver

A low power long range transceiver is presented. The transceiver includes: an antenna configured to receive an rf signal; an analog front-end circuit configured to receive the rf signal from the antenna and pre-condition the rf signal by at least one of amplify the rf signal, shift frequency of the rf signal and filter the rf signal; and a demodulator configured to receive the preconditioned signal from the front-end circuit and an assertion trigger signal signifying an end of a predefined time period, where the demodulator, in response to the assertion trigger signal, outputs a data value for a given data bit in the rf signal.
The Regents Of The University Of Michigan

Identity authentication platform

A system and method for identity authentication, including: registering an identity card issued by an authoritative entity to an individual with an identity authentication platform including generating a reference face recognition template for the individual in response to the identity card presented by the individual during registration; obtaining a real-time photograph of the individual in response to an assertion of an identity made by the individual; and authenticating the assertion made by the individual by generating a target face recognition template in response to the real-time photograph and matching the target face recognition template to the reference face recognition template.. .
Hotcoal Inc.

Using ontologies to comprehend regular expressions

Ontologies are used to comprehend regular expressions, by selecting, based on a context relating to a domain of a regular expression, an ontology and an assertion base, parsing the regular expression to identify at least one fragment of the regular expression, identifying one or more assertions in the assertion base corresponding to one of the identified fragments, identifying, for each identified assertion, an associated node in the ontology, and returning, based on the associated nodes, a concept in the ontology as representing the associated fragment of the regular expression.. .
International Business Machines Corporation

Single sign-on for managed mobile devices

Disclosed are various examples for single-sign on by way of managed mobile devices. For example, an identity provider service can receive a request for an identity assertion from an application executed in a client device.
Airwatch Llc

Single sign-on for unmanaged mobile devices

Disclosed are various examples for providing a single sign-on experience for mobile applications that may or may not be managed. A first application executed in a client device sends an access request to a service provider.
Airwatch Llc

Extension of model-based design to identify and analyze impact of reliability information on systems and components

Methods and devices for providing and using a technical computing environment (tce) for receiving a tce model that, when executed, simulates behavior of a dynamic physical system, and that represents one or more physical components and their respective reliability information in a block diagram model. Applications of the model include automated system-level datasheet and bill of materials generation, component reliability information discovery, fault and stress assertions, and identification of emergent faults..
The Mathworks, Inc.

Configurable mapping of timer channels to protection groups

An apparatus and method for mapping timer channels to protection groups. One embodiment of the method can be implemented in a microcontroller unit (mcu) that comprises a central processing unit (cpu) coupled to a plurality of timer channels and a plurality of programmable group output disable (ptgod) circuits.
Renesas Electronics America Inc.

Media stream trust display

Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In particular, composite content having various content elements is rendered via a user interface of a browser or other application that supports web-based communications.
Microsoft Technology Licensing, Llc

Authoring system for assembling clinical knowledge

Embodiments of the invention relate to ranking of data and retrieval of data or relationships of the data responsive to the ranking. A data model is represented as a graph, with edges in the graph linking related concepts, and an assertion represented in the graph as a reified n-ary relation.
International Business Machines Corporation

Hardware/software agnostic design generation

For hardware/software agnostic design generation, a method encodes a logic design as a linear array that includes a plurality of logic states. Each logic state includes one or more binary output variables, one or more binary input variables, one or more minterms of the one or more binary input variables, one or more maxterms of the one or more minterms, one or more present state values, and one or more next state values.
Assurant Design Automation Llc

Charge pump circuit for a phase locked loop

Disclosed herein is a circuit including a phase frequency detector (pfd) configured to compare phases of an input signal and a feedback signal, and to generate first and second control signals as a function of that comparison. An attenuation circuit includes a capacitor coupled in series between a node and a switching node, and is configured to charge the capacitor and disconnect the switching node from ground based on assertion of the first control signal, and discharge the capacitor and connect the switching node to ground based on assertion of the second control signal..
Stmicroelectronics International N.v.

Debugging scan latch circuits using flip devices

A latch circuit having a master latch and a slave latch includes a device used to short either the master latch or the slave latch. The device includes a transistor and a global control used to assert a signal, and is positioned to short an inverter of the master latch or the slave latch.
International Business Machines Corporation

System and remotely directed filtering and sorting of near real-time audio or video messages

Remotely directed filtering and sorting of near real-time audio or video messages is accomplished by including, within a messaging device, a messaging client application capable of assigning via a user interface attributes to an outgoing message, including a filtering assertion and a sorting assertion which express efficiently a sender's judgment about the relevance and currency of past, current and future messages with common attributes. Upon receiving a plurality of near real-time audio or video messages, the messaging client application enables a user to select attributes via a user interface for grouping pending messages, which are filtered and sorted in accordance with procedures that aggregate filtering and sorting assertions associated with messages having common attributes.

Control path verification of hardware design for pipelined process

Methods and systems for verifying that logic for implementing a pipelined process in hardware correctly moves data through the pipelined process. The method includes: (a) monitoring data input to the pipelined process to determine when watched data has been input to the pipelined process; (b) in response to determining the watched data has been input to the pipelined process counting a number of progressing clock cycles for the watched data; and (c) evaluating an assertion written in an assertion based language, the assertion establishing that when the watched data is output from the pipelined process the counted number of progressing clock cycles for the watched data should be equal to one of one or more predetermined values..
Imagination Technologies Limited

Deadlock detection in hardware design using assertion based verification

Methods and systems for detecting deadlock in a hardware design. The method comprises identifying one or more control signals in the hardware design; generating a state machine for each of the one or more control signals to track the state of the control signal; generating one or more assertions for each control signal to detect that the control signal is in a deadlock state from the state machine; and detecting whether any of the one or more control signal are in a deadlock state using the assertions.
Imagination Technologies Limited

Under voltage detection and performance throttling

An under voltage detection circuit and method of operating an ic including the same is disclosed. In one embodiment, an ic includes an under voltage protection circuit having first and second comparators configured to compare a supply voltage to first and second voltage thresholds, respectively, with the second voltage threshold being greater than the first.
Apple Inc.

Technologies for authentication and single-sign-on using device security assertions

Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client.

System and scoping a user identity assertion to collaborative devices

A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion enables the devices to access an application system.
Motorola Solutions, Inc

Multi-domain applications with authorization and authentication in cloud environment

A multi-domain application requiring sso and slo operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (mds) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (slos) on the domains of the multi-domain application and to invalidate the user sessions on the domains.
Sap Se

Multifaceted assertion directory system

A method of providing one or more assertions about a subject is provided. The method includes obtaining, at an assertion directory access server and over a network, a first assertion about a first attribute of the subject from a first assertion issuer; obtaining, at the assertion directory access server and over a network, a second assertion about a second attribute of the subject from a second assertion issuer; and providing, from the assertion directory access server, the first assertion and the second assertion to an assertion directory authority server over a network..
Verisign, Inc.

Integrated-circuit radio

An integrated-circuit radio communication device (1) comprises a processor (7) having a hardware-interrupt input line; memory (13); radio communication logic (17); and interrupt-interface logic (8). The memory (13) contains a firmware module (23) comprising (i) instructions (31) for controlling the radio communication logic (17) according to a predetermined radio protocol, and (ii) an interrupt routine comprising instructions for receiving an identification of a radio communication function in the firmware module (23) and for invoking the identified radio communication function.
Nordic Semiconductor Asa

Microcontroller or microprocessor with dual mode interrupt

A microcontroller has a cpu with at least one interrupt input coupled with an interrupt controller, a plurality of peripherals, and a mode register comprising at least one bit controlling an operating mode of the microcontroller. The microcontroller is configured to operate in a first operating mode wherein upon assertion of an interrupt by a peripheral of the microcontroller, the interrupt controller forwards an interrupt signal to the cpu and the peripheral sets an associated interrupt flag, wherein the interrupt causes the cpu to branch to a predefined interrupt address associated with the interrupt input.
Microchip Technology Incorporated

System and implementing a hosted authentication service

A system, apparatus, method, and machine readable medium are described for a hosted authentication service. For example, one embodiment of a system comprises: a hosted authentication service to provide authentication services for relying parties, the hosted authentication service registering a relying party by sharing a key with the relying party; a first program code component inserted into an application hosted by the relying party, the first program code component causing a client device accessing the application to be redirected to the hosted authentication service for authentication-related functions; and the hosted authentication service transmitting one or more assertions to the relying party specifying authentication-related events occurring between the client device and the hosted authentication service, the relying party validating the assertions using the key..
Nok Nok Labs, Inc.

Shared gate fed sense amplifier

A first plurality of storage cells may be coupled to a first pair of data lines, and a second plurality of storage cells may be coupled to a second pair of data lines. Each storage cell in the first plurality of storage cells may be configured to generate a first output signal on the first pair of data lines in response to an assertion of a respective one of first plurality of selection signals, and each storage cell in the second plurality of storage cells may be configured to generate a second output signal on the second pair of data lines in response to the assertion of a respective one of a second plurality of selection signals.
Apple Inc.

System and method to support identity theft protection as part of a distributed service oriented ecosystem

A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in internet protocol (ip) multimedia subsystem (ims) and non-ims networks. The system includes an identity session initiation protocol (sip) application server configured to act as a security assertion markup language (saml) bridge, which allows an sip enabled device or a non-sip enabled device to attach to a telecommunications service provider network.
International Business Machines Corporation

Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)

A computer-implemented method for calculating an effect on timing of moving a pin from an edge position to an inboard position in processing large block synthesis (lbs). The method includes determining first timing details at the inboard position, based on internal wire segments between a signal source and the inboard position.
International Business Machines Corporation

Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)

A computer-implemented method for calculating an effect on timing of moving a pin from an edge position to an inboard position in processing large block synthesis (lbs). The method includes determining first timing details at the inboard position, based on internal wire segments between a signal source and the inboard position.
International Business Machines Corporation

Method of and system for flame sensing and diagnostic

A method of determining presence of a flame in a furnace of a heating, ventilation, and air conditioning (hvac) system. The method comprises determining, using a controller, whether a processor signal (g) is active, responsive to a determination that the processor signal (g) is active, determining, using the controller prior to assertion of a flame-test input control signal, an output state of a first comparator, responsive to a determination that the output state of the first comparator is high, determining, using the controller prior to assertion of the flame-test input control signal, an output state of a second comparator, and responsive to a determination that the output state of the second comparator is low, transmitting, using the controller, a notification that a flame is present..
Lennox Industries Inc.

Cloud-based biometric enrollment, identification and verification through identity providers

A system and method for cloud-based biometric enrollment, identification and verification are disclosed. More specifically, a cloud-based system and method is used for enrollment of biometric templates.
Imageware Systems, Inc.

Methods and controlled recovery of error information between independently operable processors

Methods and apparatus for controlled recovery of error information between two (or more) independently operable processors. The present disclosure provides solutions that preserve error information in the event of a fatal error, coordinate reset conditions between independently operable processors, and implement consistent frameworks for error information recovery across a range of potential fatal errors.
Apple Inc.



Assertion topics:
  • Social Networking
  • Social Network
  • Networking
  • Machine Learning
  • Repository
  • Clock Divider
  • High Speed
  • Graphics Processing Unit
  • Interactive
  • Breakpoint
  • Concurrent
  • Concurrency
  • Expressions
  • Deasserted
  • Storage Device


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.4779

    file did exist - file did put2292

    5 - 1 - 51