Follow us on Twitter
twitter icon@FreshPatents

Assertion patents

Bulk PDF Downloads
      

This page is updated frequently with new Assertion-related patent applications.




 Integrated-circuit radio patent thumbnailIntegrated-circuit radio
An integrated-circuit radio communication device (1) comprises a processor (7) having a hardware-interrupt input line; memory (13); radio communication logic (17); and interrupt-interface logic (8). The memory (13) contains a firmware module (23) comprising (i) instructions (31) for controlling the radio communication logic (17) according to a predetermined radio protocol, and (ii) an interrupt routine comprising instructions for receiving an identification of a radio communication function in the firmware module (23) and for invoking the identified radio communication function.
Nordic Semiconductor Asa


 Microcontroller or microprocessor with dual mode interrupt patent thumbnailMicrocontroller or microprocessor with dual mode interrupt
A microcontroller has a cpu with at least one interrupt input coupled with an interrupt controller, a plurality of peripherals, and a mode register comprising at least one bit controlling an operating mode of the microcontroller. The microcontroller is configured to operate in a first operating mode wherein upon assertion of an interrupt by a peripheral of the microcontroller, the interrupt controller forwards an interrupt signal to the cpu and the peripheral sets an associated interrupt flag, wherein the interrupt causes the cpu to branch to a predefined interrupt address associated with the interrupt input.
Microchip Technology Incorporated


 System and  implementing a hosted authentication service patent thumbnailSystem and implementing a hosted authentication service
A system, apparatus, method, and machine readable medium are described for a hosted authentication service. For example, one embodiment of a system comprises: a hosted authentication service to provide authentication services for relying parties, the hosted authentication service registering a relying party by sharing a key with the relying party; a first program code component inserted into an application hosted by the relying party, the first program code component causing a client device accessing the application to be redirected to the hosted authentication service for authentication-related functions; and the hosted authentication service transmitting one or more assertions to the relying party specifying authentication-related events occurring between the client device and the hosted authentication service, the relying party validating the assertions using the key..
Nok Nok Labs, Inc.


 Shared gate fed sense amplifier patent thumbnailShared gate fed sense amplifier
A first plurality of storage cells may be coupled to a first pair of data lines, and a second plurality of storage cells may be coupled to a second pair of data lines. Each storage cell in the first plurality of storage cells may be configured to generate a first output signal on the first pair of data lines in response to an assertion of a respective one of first plurality of selection signals, and each storage cell in the second plurality of storage cells may be configured to generate a second output signal on the second pair of data lines in response to the assertion of a respective one of a second plurality of selection signals.
Apple Inc.


 System and method to support identity theft protection as part of a distributed service oriented ecosystem patent thumbnailSystem and method to support identity theft protection as part of a distributed service oriented ecosystem
A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in internet protocol (ip) multimedia subsystem (ims) and non-ims networks. The system includes an identity session initiation protocol (sip) application server configured to act as a security assertion markup language (saml) bridge, which allows an sip enabled device or a non-sip enabled device to attach to a telecommunications service provider network.
International Business Machines Corporation


 Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs) patent thumbnailMethod for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)
A computer-implemented method for calculating an effect on timing of moving a pin from an edge position to an inboard position in processing large block synthesis (lbs). The method includes determining first timing details at the inboard position, based on internal wire segments between a signal source and the inboard position.
International Business Machines Corporation


 Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs) patent thumbnailMethod for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)
A computer-implemented method for calculating an effect on timing of moving a pin from an edge position to an inboard position in processing large block synthesis (lbs). The method includes determining first timing details at the inboard position, based on internal wire segments between a signal source and the inboard position.
International Business Machines Corporation


 Method of and system for flame sensing and diagnostic patent thumbnailMethod of and system for flame sensing and diagnostic
A method of determining presence of a flame in a furnace of a heating, ventilation, and air conditioning (hvac) system. The method comprises determining, using a controller, whether a processor signal (g) is active, responsive to a determination that the processor signal (g) is active, determining, using the controller prior to assertion of a flame-test input control signal, an output state of a first comparator, responsive to a determination that the output state of the first comparator is high, determining, using the controller prior to assertion of the flame-test input control signal, an output state of a second comparator, and responsive to a determination that the output state of the second comparator is low, transmitting, using the controller, a notification that a flame is present..
Lennox Industries Inc.


 Cloud-based biometric enrollment, identification and verification through identity providers patent thumbnailCloud-based biometric enrollment, identification and verification through identity providers
A system and method for cloud-based biometric enrollment, identification and verification are disclosed. More specifically, a cloud-based system and method is used for enrollment of biometric templates.
Imageware Systems, Inc.


 Methods and  controlled recovery of error information between independently operable processors patent thumbnailMethods and controlled recovery of error information between independently operable processors
Methods and apparatus for controlled recovery of error information between two (or more) independently operable processors. The present disclosure provides solutions that preserve error information in the event of a fatal error, coordinate reset conditions between independently operable processors, and implement consistent frameworks for error information recovery across a range of potential fatal errors.
Apple Inc.


Arbiter verification


Operation of an arbiter in a hardware design is verified. The arbiter receives a plurality of requests over a plurality of clock cycles, including a monitored request and outputs the requests in priority order.
Imagination Technologies Limited


Identity management and authentication system for resource access


A system that authorizes access to a resource by a client validates the client and generates a security assertion markup language (“saml”) assertion for the valid client. The system then sends an access request with the saml assertion to a oauth server.
Oracle International Corporation


Method for calibrating a clock signal generator in a reduced power state


Various embodiments of a clock generator are disclosed. An example system may include a functional unit, and a clock generation unit configured to adjust a frequency of an output clock signal responsive to an assertion of an enable signal from the functional unit.
Apple Inc.


Technologies for secure presence assurance


Technologies for secure presence assurance include a computing device having a presence assertion circuitry that receives an input seed value and generates a cryptographic hash based on the received input seed value. The computing device further verifies the integrity of the presence assertion circuitry based on the generated cryptographic hash..

Voltage level shifter for high voltage applications


A voltage level shifter for high voltage applications has a low voltage domain current mirror having first and second branches. A high voltage switch and a resistor are connected in series with the second branch.

Managing assertions while compiling and debugging source code


The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, while the ide tool is compiling the source code of a development project, the ide tool generates at least a first compiler warning.

Managing assertions while compiling and debugging source code


The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, while the ide tool is compiling the source code of a development project, the ide tool generates at least a first compiler warning.

Assertions based on recently changed code


The present disclosure relates to managing assertions in program source code in an integrated development environment (ide) tool. According to one embodiment, the ide tool receives a request to execute an application built from source code of a development project from a user interacting with an integrated development environment (ide) tool.

Assertions based on recently changed code


The present disclosure relates to managing assertions in program source code in an integrated development environment (ide) tool. According to one embodiment, the ide tool receives a request to execute an application built from source code of a development project from a user interacting with an integrated development environment (ide) tool.

Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Optimizing program performance with assertion management


The present disclosure relates to maintaining assertions in source code components of a development project by an integrated development environment (ide) tool. According to one embodiment, a request is received to build a software application generated from the development project.

Assertion management in an integrated development environment


The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, the ide receives a request to add an assertion at a specified location within source code of an application from a user interacting with an integrated development environment (ide) tool.

Optimizing program performance with assertion management


The present disclosure relates to maintaining assertions in source code components of a development project by an integrated development environment (ide) tool. According to one embodiment, a request is received to build a software application generated from the development project.

Managed assertions in an integrated development environment


The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, the ide receives a request to add an assertion at a specified location within source code of an application from a user interacting with an integrated development environment (ide) tool.

Location-enforced data management in complex multi-region computing


A location-reporting request is sent by a processor to at least one remote server. The location-reporting request requests processing of data away from a geo-location-aware client device and instructs any available server to respond with a reported geographic location.
International Business Machines Corporation


Method for authenticating a user, corresponding server, communications terminal and programs


A method is provided for authenticating a user's communications terminal with an authentication server connected to a gateway terminal by using a communications network. The method includes: obtaining a piece of data representing an identity of the user from the gateway terminal; configuring, by the authentication server, a data transmission link between the authentication server and the terminal, using a predefined data transmission interface of the gateway terminal and as a function of the piece of data representing the identity of the user; transmitting, by the authentication server, to the terminal, a piece of encrypted data for checking authentication, using the data transmission link; receiving, by the authentication user, coming from the terminal, a piece of encrypted data for counter-checking authentication; issuing an assertion of authentication of the user when the piece of data for the counter-checking of authentication corresponds to the piece of data for checking authentication..
Ingenico Group


Method and device for real-time knowledge processing based on an ontology with temporal extensions


Embodiments are directed towards a method and a computer server for receiving assertions, wherein an assertion can have a functional property such that for a given subject and a given property the object has a single value at any time, maintaining a knowledge base that includes a history table that stores previously received assertions, the method comprising selecting an assertion for processing, generating an assertion tuple that corresponds to the selected assertion, determining that the property of the selected assertion is functional; and writing the assertion tuple to the history table.. .
Smartcloud, Inc.


Method of privacy preserving during an access to a restricted service


The present invention relates to a method of privacy-preserving during an access to a restricted e-service requiring user private data from a smart card. The invention relates more particularly to the field of methods implemented so that the user has the guarantee that only the private data needed to access to the e-service are extracted from the smart card.
Gemalto Sa


Redirect to inspection proxy using single-sign-on bootstrapping


An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user.
Cisco Technology, Inc.


Handling blind statements in mixed language environments


This application discloses a computing system configured to determine that a first bind command is configured to prompt instantiation of an assertion module in a target module of a circuit design, which creates a mixed-language environment for the circuit design. The computing system, in response to the determination that the first bind command is configured to create the mixed-language environment for the circuit design, configured to generate a wrapper module configured to prompt instantiation of the assertion module in the wrapper module.
Mentor Graphics Corporation


Identity assertion based on biometric information


A method and apparatus for providing a lifetime extension to an identity assertion is provided herein. During operation a user will authenticate to an identity management server (also known as an authorization server or an authentication server) to obtain an identity assertion.
Motorola Solutions, Inc.


Systems and methods for system login and single sign-on


Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected application of a second system.
Openlane, Inc.


System and providing a health determination service based on user knowledge and activity


Examples are provided herein for providing a service in connection with determining a health of a user. A collection of questions are stored for the user, with each question being based on a documented assertion pertaining to human health.
Health Equity Labs


System on chip i/o connectivity verification in presence of low power design considerations


Formal verification of connectivity of a circuit, for example, a circuit representing a system on chip i/o ring is performed with low power considerations. The formal verification determines whether the connectivity of a circuit remains valid when low power design specification is introduced.
Synopsys, Inc.


Object restraint systems and methods of operation thereof


Embodiments include object restraint systems and methods of their operation. The system is contained in a vehicle with a passenger compartment, and includes sensor and processing subsystems, a vessel, a restraint mechanism, and an actuator.
Freescale Semiconductor, Inc.


System and single sign-on technical support access to tenant accounts and data in a multi-tenant platform


Shown is single sign-on support access to tenant accounts in a multi-tenant service platform involving a proxy user account in an identity provider for a tenant account on the service platform having security metadata associated therewith, mapping in the identity provider maps a support user to a proxy user identifier, a corresponding security endpoint in the service platform and mapping of the proxy user account identifier to the tenant account and security metadata. The identity provider authenticates a request to access the tenant account on the service platform, obtains the security credentials for the proxy user identifier, and sends a security assertion with the proxy user identifier and the security metadata to the security endpoint.
Zuora, Inc.


Igniter and vehicle, and controlling ignition coil


An igniter that includes switch element and switch control device for controlling the switch element depending on ignition signal. The switch control device includes a determination stage that compares voltage associated with the ignition signal with a predetermined voltage to generate a determination signal, a driving stage that controls on/off operations of the switch element depending on the determination signal, a timer circuit that asserts a conduction protection signal when state where the determination signal becomes an assert level corresponding to an on operation of the switch element continues for predetermined time, a time-varying voltage generating circuit that generates time-varying voltage over time in response to the assertion of the conduction protection signal, and an amplifier that changes the voltage of a control terminal of the switch element such that detection voltage associated with coil current flowing in the switch element is close to the time-varying voltage..
Rohm Co., Ltd.


Method and enabling secured certificate enrollment in a hybrid cloud public key infrastructure


In a method a public key infrastructure (pki) device receives a certificate signing request (csr) and an identity assertion cryptographically bound to an end entity issuing the csr. The pki device validates the authenticity and integrity of the csr using the identity assertion.
Motorola Solutions, Inc.


Continuous multi-factor authentication


Technologies for continuously authenticating a user via multiple authentication factors include a computing device for generating a continuous authentication assertion indicating that continuous authentication of a user is being monitored, sending the continuous authentication assertion to a key distribution center server, and requesting and receiving an initial ticket from the key distribution center server. Such technologies may also include requesting a service ticket from the key distribution center server for accessing a service provider server, receiving a service ticket from the key distribution center server including the continuous authentication assertion, requesting access to the service provider server with the service ticket including the continuous authentication assertion, and accessing the service provider server in response to the continuous authentication assertion being verified..

Method and interrupt coalescing


Apparatus and methods implemented therein moderate the rate at which a peripheral device interrupts the operation of a host device. Moderation of interrupts is achieved by implementing interrupt coalescing schemes.
Sandisk Technologies Inc.


Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Microcontroller unit and operating a microcontroller unit


A microcontroller unit (mcu) having a functional state, a reset state, and one or more assertable fault sources is described. Each fault source has its own fault source assertion count and its own fault source assertion limit; the mcu is arranged to perform the following sequence of operations in a cyclic manner: if one or more of the fault sources are asserted, pass from the functional state to the reset state and increase the respective fault source assertion counts by one increment; if one or more of the fault source assertion counts exceeds the respective fault source assertion limit, disable the respective fault source; and pass from the reset state to the functional state.
Freescale Semiconductor, Inc.


Throttling circuitry


Techniques are disclosed relating to processor power control and interrupts. In one embodiment, an apparatus includes a processor configured to assert an indicator that the processor is suspending execution of instructions until the processor receives an interrupt.
Apple Inc.


Storage device and processing power disable signal


A storage device for connection with a host device via an interface bus, includes a storage unit and a storage controller configured to control access to the storage unit and receive a power disable signal from the host device. The storage controller includes a plurality of processing units, each of which receives an interrupt signal to initiate power disable processing, in response to assertion of the power disable signal..
Kabushiki Kaisha Toshiba


Dynamic generation of policy enforcement rules and actions from policy attachment semantics


At least one set of enforceable policy provisions is identified within at least one defined service level policy to be enforced during runtime by a policy enforcement point (pep). Each set of enforceable policy provisions includes a policy subject, a reference to a policy domain, and at least one assertion.
International Business Machines Corporation


Single sign on for native and wrapped web resources on mobile devices


A method includes performing operations as follows on a processor: associating a single sign on module with a native application residing on a mobile device, detecting, using the single sign on module, user invocation of the native application, the native application to request access to a resource from a service provider server, determining, using the single sign on module, whether the mobile device has a token stored thereon that indicates the user has been previously authenticated with an identity provider server, sending, using the single sign on module, the token to the identity provider server when the token is determined to be stored on the mobile device, receiving, at the single sign on module, an identity assertion for the user from the identity provider server responsive to sending the token to the identity provider server, and providing, using the single sign on module, the identity assertion to the native application. The service provider server is independent of the identity provider server..
Ca, Inc.


Fan motor driving apparatus and method, cooling system including the same, and electronic equipment


A motor driving apparatus comprises an h bridge circuit having outputs coupled with a motor coil of a single-phase motor, a hall comparator configured to generate a hall detection signal indicating a position of a rotor of the motor, an electric angle generator configured to generate a pulse signal indicating that the motor rotates by a predetermined electric angle, a current monitoring circuit configured to asserts a zero current detection signal upon detecting a reversed direction of a coil current; a transition trigger circuit configured to assert a transition pulse when a count value of the first counter matches an lead angle set value; a logic circuit configured to transition the h bridge circuit according to a predetermined sequence of states; and a lead angle controller configured to adjust the lead angle set value based on a timing of assertion of the zero current detection signal.. .
Rohm Co., Ltd.


Memory device and performing a write operation in a memory device


The present invention provides a technique for performing write operations within a memory device comprising an array of memory cells. Wordline driver circuitry is used to assert a wordline signal to activate an addressed memory cell in the array.
Arm Limited


Over-voltage protection circuit for a drive transistor


A drive transistor is connected to a resonant load in a low-side drive configuration. The voltage across the conduction terminals of the drive transistor is sensed and compared to an over-voltage threshold.

Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a logical design, and a processor to execute a synthesis engine.
International Business Machines Corporation


Federated full domain logon


Methods and systems for faster and more efficient smart card logon and for giving a client device full domain access in a remote computing environment are described herein. Components used to implement fast smart card logon may also be used to implement a federated full domain logon.
Citrix Systems, Inc.


Mesh grid protection system


A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid lines.
Broadcom Corporation


Method and timing synchronization in a distributed timing system


In one aspect of the teachings herein, a timing circuit detects the assertion of an incoming timing pulse signal at a timing resolution higher than that afforded by the sampling clock signal used to detect the assertion event. To do so, the timing circuit uses delay circuitry to obtain incrementally delayed versions of the incoming timing pulse signal or sampling clock signal.
Telefonaktiebolaget L M Ericsson (publ)


Identification and verification of factual assertions in natural language


A system for verifying factual assertions in natural language. Receiving a text input.
International Business Machines Corporation


Social networking behavior-based identity system


Disclosed are various embodiments for a social networking behavior-based identity system that employs social networking data that a user has elected to share through an opt-in procedure. First social networking data is stored in association with a user identity.
Amazon Technologies, Inc.


Systems and methods for performing user recognition based on biometric information captured with wearable electronic devices


Systems and methods are disclosed herein for performing biometrics based user recognition and monitoring based on biometric information captured using wearable monitoring devices. More specifically, the present application provides systems including monitoring devices built into one or more articles of clothing that capture data relating to the wearer of the device and other subjects, such as biometric information, health vitals, environmental information, location data and the like.
Hoyos Labs Corp.


Dynamic gearshift during oscillator build-up based on duty cycle


A dynamic gearshifting system includes a monitoring device configured to monitor a duty cycle of a clock output signal of a crystal oscillator circuit during oscillation buildup upon power-up of the crystal oscillator circuit. The dynamic gearshifting system also includes a detecting device configured to detect whether the duty cycle of the clock output signal of the crystal oscillator circuit meets a duty cycle threshold value.
Gainspan Corporation


Method and circuits for low latency initialization of static random access memory


A method and various circuit embodiments for low latency initialization of an sram are disclosed. In one embodiment, an ic includes an sram coupled to at least one functional circuit block.
Apple Inc.


Method for issuing an assertion of location


A method provides a location assertion for a transaction device that has requested, from a server and via a communication network, acceptance of a financial transaction involving the use of banking information. The method includes: receiving a transaction request from the transaction device, including at least one user identifier with which the banking information is associated; a obtaining an ip address associated with the transaction device; determining a current location associated with the ip address; comparing the current location to at least one authorized location on the basis of the identifier of the user; and providing a location assertion to an entity when the comparison step yields a positive result..
Ingenico Group


Probabilistic assertions and verifying them


Various techniques for evaluating probabilistic assertions are described herein. In one example, a method includes transforming a program, a probabilistic assertion, and an input into an intermediate representation, the intermediate representation including a bayesian network of nodes representing distributions.
Microsoft Corporation


Sharing asserted media


Concepts and technologies are disclosed herein for sharing asserted media. An assertion application can be executed by a device to generate asserted media.
At&t Intellectual Property I, L.p.


Order a batch download of a huge number of patent PDFs. Bulk PDF Downloads This is a premium service.

Testable power-on-reset circuit


An integrated circuit with a testable power-on-reset (por) circuit includes a voltage divider, an inverter, a level-shifter, a buffer and a flip-flop. The voltage divider receives a first supply voltage and generates a second supply voltage.
Freescale Semiconductor, Inc.


Reset circuitry for integrated circuit


An on-board reset circuit for a system-on-chip (soc) addresses the problem of meta-stability in flip-flops on asynchronous reset that arises when different power domains or reset domains receive resets from different sources. To ameliorate the problem, a reset signal is asserted and de-asserted while the clocks are gated.
Freescale Semiconductor, Inc.


Network traffic monitoring system and method to redirect network traffic through a network intermediary


A network traffic monitoring system for redirecting network traffic between a client device and a cloud service includes a monitor proxy server configured as a network intermediary between the client device and the cloud service; and a published identity provider. The published identity provider is configured to receive a login request from a client device and to authenticate the client device at a federated identity provider.
Skyhigh Networks, Inc.


Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The method includes performing a baseline synthesis to obtain a baseline physical design using timing constraints and an overall power budget.
International Business Machines Corporation


Stack roster fantasy sports game and platform


A method and system for playing a fantasy sport competition among a plurality of users, includes instructions stored on a non-transitory computer readable medium for transmitting user selections to suitably order players in the user roster. Any user requests to commence a draft.
Sport Gamet International Llc


Method for waking a data transceiver through data reception


A method for managing power in a system, in which the system may include a first device configured to transmit serial data and a second device, coupled to the first device. The second device may include a transceiver and interrupt logic, and may be configured to activate the interrupt logic and enable a reduced power mode for the transceiver.
Apple Inc.


Digital credential with embedded authentication instructions


Methods and systems are provided for sending messages in a security system. In particular, a new message syntax can include one or more positive assertions that may be verified.
Assa Abloy Ab


Secure mobile client with assertions for access to service provider applications


A software-as-a-service (saas) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more saas applications to access, and including an idp identifier for the saas application. The saas access control application includes software to be inserted into a network software stack of the client device and software configured to serve as an identity provider for assertions.
Cisco Technology, Inc.


Providing a guest with access to content of a social network


Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. .
International Business Machines Corporation


Providing a guest with access to content of a social network


Providing a guest with access to content of a social network includes identifying a guest associated with content posted by a user on a social network, sending, via electronic mail (email), a notification to the guest's email address to notify the guest of the content on the social network, receiving, via an identity provider, an identity assertion associated with the guest's email address, and providing, based on the identity assertion, access to the content posted by the user on the social network to allow the guest to view the content, in which the identity provider is identified by a domain of the guest's email address.. .
International Business Machines Corporation


Data mining in a business intelligence document


A business intelligence document provides functionality for testing a hypothesis on aggregated data in a business intelligence document (e.g., a spreadsheet-like document), wherein one or more of the input data values and transformation properties are designated as constrained (e.g., invariant or constrained within a range, set, enumeration, or domain). The hypothesis, which is articulated as a data mining assertion, is input through the user interface of the business intelligence document (e.g., via an expression interface or properties of a row, column, or cell) and solved over the aggregated data.
Microsoft Technology Licensing, Llc


Techniques to communicate with a controller for a non-volatile dual in-line memory module


Examples may include communicating with a controller for a non-volatile dual in-line memory module through a system management bus (smbus) interface. In some examples, selective assertion of bits maintained in registers accessible through the smbus interface may enable communication with the controller.

Boost converter stage switch controller


A low voltage lamp includes a boost converter stage and a load. The load may include low voltage light producing elements including low voltage light emitting diodes.
Cirrus Logic, Inc.


System and utilizing a logical graphical model for scenario analysis


A system and method for utilizing a logical graphical model for data analysis are described. The system provides a “pgm authoring tool” that enables a user to employ a logical graphical model to create, edit, and browse the assertions and inferences in a probabilistic graphical model..
Clados Management Llc


Systems, devices, and/or methods for managing information


Certain exemplary embodiments can provide a system, machine, device, manufacture, circuit, composition of matter, and/or user interface adapted for and/or resulting from, and/or a method and/or machine-readable medium comprising machine-implementable instructions for, activities that can comprise and/or relate to, automatically generating a story regarding a predetermined topic from a plurality of assertions.. .

Methods and systems for authorizing web service requests


Systems and methods for authorizing web service requests. In some embodiments, a computer-implemented method includes receiving a web service request having an authorization header and business code, authenticating a security assertion markup language (saml) token included in the authorization header and constructing a security context based on attributes of the saml token.
General Electric Company


Method of identification, corresponding device and program


A method and device are provided for method for identifying a user for access to an article or a service. The method includes: presentation to a terminal, by the user to be identified, of a payment card; execution, by the terminal, of a payment transaction, the amount of which is zero; and when said payment transaction is executed without error, issuing an assertion of identification leading to access to the article or service..
Ingenico Group


Method and appartus for distributed power assertion


A method and an apparatus for a power assertion management are described. A power assertion indicator may be maintained for a device component having a power level.
Apple Inc.


Privacy enhanced key management for a web service provider using a converged security engine


In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.
Intel Corporation


Custom knowledgebases and sequence datasets


Illustrative embodiments of custom knowledgebases and sequence datasets, as well as related methods, are disclosed. In one illustrative embodiment, one or more computer-readable media may comprise a custom knowledgebase and an associated sequence dataset.
Battelle Memorial Institute


Independent identity management systems


Systems, methods and apparatus embodiments are described herein for authenticating a user and/or a user equipment (ue). For example, a user and/or ue may request access to a service controlled by a service provider (sp).
Interdigital Patent Holdings Inc.


Privacy verification tool


Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool.
Facebook, Inc.


Method and enabling a user assertion service for visitors to web pages


A method and user interface object for invoking a user assertion service to operate with a web page are disclosed. Consistent with one embodiment of the invention, a web portal hosting a user assertion service enables an evaluator to include a user interface element on his requirement posting.

Method and system for evaluating user assertions


The various embodiments herein disclose a method and system for enabling users to make assertions of suitability and have other users evaluate those assertions. According to an embodiment of the present invention, the method comprises steps of receiving an application along with a guarantee from an applicant.

Traffic on-boarding for acceleration through out-of-band security authenticators


A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource.
Akamai Technologies, Inc.


Method for verifying the authenticity of a terminal, corresponding device and program


A method is provided for verifying an authenticity of a payment terminal, implemented by using of a device for verifying authenticity. The method includes: transmitting to the payment terminal a request for obtaining a piece of identification data by using of a contactless communications interface; receiving a response, through said contactless communications interface and coming from the payment terminal, to said request for obtaining a piece of identification data; comparing a field of said response with at least one piece of pre-recorded identification data; when the field includes a piece of identification data identical to said at least one piece of pre-recorded identification data, for issuing an assertion of authenticity of said payment terminal; when the field comprises a piece of identification data different from said at least one piece of pre-recorded identification data, issuing a piece of information on absence of authentication of the payment terminal..
Compagnie Industrielle Et Financiere D'ingenierie "ingenico"


Clock verification


Methods and systems for verifying a derived clock using assertion-based verification. The method comprises counting the number of full or half cycles of a fast clock that occur between the rising edge and the falling edge of a slow clock (i.e.
Imagination Technologies Limited


Method and device for operating a vehicle application


In a method, each received vehicle-to-x message is at least partly forwarded to at least one application of a vehicle depending on specified information of the vehicle-to-x message (n), the vehicle-to-x message comprising a digital signature. Digital signatures of the vehicle-to-x messages relevant to the decision that a specified action of the application should be carried out are validated depending on a decision signal provided in response to the vehicle-to-x messages being forwarded to the at least one application and which represents an assertion as to whether the vehicle-to-x messages comprise data causing the action to be carried out.
Continental Automotive Gmbh


Receiver circuit and operating the same


A receiver circuit includes a clk_lp circuit, a clk_hs circuit, a data_lp circuit, a data_hs circuit and a malfunction detection circuit. The clk_lp circuit and the clk_hs circuit are connected to the clock lane.
Synaptics Display Devices Kk


Logical data flow mapping rules for (sub) graph isomorphism in a cluster computing environment


A system and a method are disclosed for transforming cluster computing resources of a target system to match a user defined logical data flow so data processing between the source and target are functionally equivalent. The source logical dataflow is compatibly mapped to a target directed acyclic graph that represents the cluster computing resources.
Concurrent, Inc.


Systems and methods for providing secure access to local network devices


A computer-implemented method for providing secure access to local network devices may include (1) identifying a local area network that provides internet connectivity to at least one device within the local area network, (2) obtaining, from an identity assertion provider, (i) a shared secret for authenticating the identity of a guest user of the device and (ii) a permission for the guest user to access the device from outside the local area network, (3) storing the shared secret and the permission within the local area network, (4) receiving, via the internet connectivity, a request by the guest user from outside the local area network to access the device, and (5) providing access to the device in response to validating the request based on the shared secret and the permission. Various other methods and systems are also disclosed..
Symantec Corporation


Security object creation, validation, and assertion for single sign on authentication


A security object creation and validation system provides an additional factor of authentication. An authentication system as described herein provides secure two-factor authentication, such as for it resources in an organization.
Secureauth Corporation


Assertion extraction from design and its signal traces


Groups of signals in an electronic design for which interesting assertions, such as assert, assume and cover properties, can be generated are identified. A sliding temporal window of fixed depth is used to sample unique present and past value combinations of signals in the signals groups generated by one or more simulations or emulations.
Synopsys, Inc.


Controlling access to a memory


A memory protection device for controlling access to a memory and a method of controlling access to a memory are disclosed. A memory status value held by latch circuitry in the memory protection device determines whether the memory is an enabled or a disabled state.
Arm Limited


Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The system includes a memory device to store a logical design, and a processor to execute a synthesis engine.
International Business Machines Corporation


Boundary based power guidance for physical synthesis


A method and system to obtain a physical design of an integrated circuit from a logical design are described. The method includes performing a baseline synthesis to obtain a baseline physical design using timing constraints and an overall power budget.
International Business Machines Corporation




Assertion topics:
  • Social Networking
  • Social Network
  • Networking
  • Machine Learning
  • Repository
  • Clock Divider
  • High Speed
  • Graphics Processing Unit
  • Interactive
  • Breakpoint
  • Concurrent
  • Concurrency
  • Expressions
  • Deasserted
  • Storage Device


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.


    2.2569

    4544

    1 - 1 - 101