Follow us on Twitter
twitter icon@FreshPatents


Assertion patents

      

This page is updated frequently with new Assertion-related patent applications.




new patent Extension of model-based design to identify and analyze impact of reliability information on systems and components
Methods and devices for providing and using a technical computing environment (tce) for receiving a tce model that, when executed, simulates behavior of a dynamic physical system, and that represents one or more physical components and their respective reliability information in a block diagram model. Applications of the model include automated system-level datasheet and bill of materials generation, component reliability information discovery, fault and stress assertions, and identification of emergent faults..
The Mathworks, Inc.


new patent Configurable mapping of timer channels to protection groups
An apparatus and method for mapping timer channels to protection groups. One embodiment of the method can be implemented in a microcontroller unit (mcu) that comprises a central processing unit (cpu) coupled to a plurality of timer channels and a plurality of programmable group output disable (ptgod) circuits.
Renesas Electronics America Inc.


Media stream trust display
Media stream trust display techniques are described in which trust information regarding content elements is accessible on an individual element basis. In particular, composite content having various content elements is rendered via a user interface of a browser or other application that supports web-based communications.
Microsoft Technology Licensing, Llc


Authoring system for assembling clinical knowledge
Embodiments of the invention relate to ranking of data and retrieval of data or relationships of the data responsive to the ranking. A data model is represented as a graph, with edges in the graph linking related concepts, and an assertion represented in the graph as a reified n-ary relation.
International Business Machines Corporation


Hardware/software agnostic design generation
For hardware/software agnostic design generation, a method encodes a logic design as a linear array that includes a plurality of logic states. Each logic state includes one or more binary output variables, one or more binary input variables, one or more minterms of the one or more binary input variables, one or more maxterms of the one or more minterms, one or more present state values, and one or more next state values.
Assurant Design Automation Llc


Charge pump circuit for a phase locked loop
Disclosed herein is a circuit including a phase frequency detector (pfd) configured to compare phases of an input signal and a feedback signal, and to generate first and second control signals as a function of that comparison. An attenuation circuit includes a capacitor coupled in series between a node and a switching node, and is configured to charge the capacitor and disconnect the switching node from ground based on assertion of the first control signal, and discharge the capacitor and connect the switching node to ground based on assertion of the second control signal..
Stmicroelectronics International N.v.


Debugging scan latch circuits using flip devices
A latch circuit having a master latch and a slave latch includes a device used to short either the master latch or the slave latch. The device includes a transistor and a global control used to assert a signal, and is positioned to short an inverter of the master latch or the slave latch.
International Business Machines Corporation


System and remotely directed filtering and sorting of near real-time audio or video messages
Remotely directed filtering and sorting of near real-time audio or video messages is accomplished by including, within a messaging device, a messaging client application capable of assigning via a user interface attributes to an outgoing message, including a filtering assertion and a sorting assertion which express efficiently a sender's judgment about the relevance and currency of past, current and future messages with common attributes. Upon receiving a plurality of near real-time audio or video messages, the messaging client application enables a user to select attributes via a user interface for grouping pending messages, which are filtered and sorted in accordance with procedures that aggregate filtering and sorting assertions associated with messages having common attributes.

Control path verification of hardware design for pipelined process
Methods and systems for verifying that logic for implementing a pipelined process in hardware correctly moves data through the pipelined process. The method includes: (a) monitoring data input to the pipelined process to determine when watched data has been input to the pipelined process; (b) in response to determining the watched data has been input to the pipelined process counting a number of progressing clock cycles for the watched data; and (c) evaluating an assertion written in an assertion based language, the assertion establishing that when the watched data is output from the pipelined process the counted number of progressing clock cycles for the watched data should be equal to one of one or more predetermined values..
Imagination Technologies Limited


Deadlock detection in hardware design using assertion based verification
Methods and systems for detecting deadlock in a hardware design. The method comprises identifying one or more control signals in the hardware design; generating a state machine for each of the one or more control signals to track the state of the control signal; generating one or more assertions for each control signal to detect that the control signal is in a deadlock state from the state machine; and detecting whether any of the one or more control signal are in a deadlock state using the assertions.
Imagination Technologies Limited


Under voltage detection and performance throttling

An under voltage detection circuit and method of operating an ic including the same is disclosed. In one embodiment, an ic includes an under voltage protection circuit having first and second comparators configured to compare a supply voltage to first and second voltage thresholds, respectively, with the second voltage threshold being greater than the first.
Apple Inc.

Technologies for authentication and single-sign-on using device security assertions

Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client.

System and scoping a user identity assertion to collaborative devices

A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion enables the devices to access an application system.
Motorola Solutions, Inc

Multi-domain applications with authorization and authentication in cloud environment

A multi-domain application requiring sso and slo operations in cloud environment is presented. The computing system of the multi-domain application includes a multi-domain service (mds) to redirect the calls for the multi-domain application to an identity provider to authenticate the user or to invoke the single logout services (slos) on the domains of the multi-domain application and to invalidate the user sessions on the domains.
Sap Se

Multifaceted assertion directory system

A method of providing one or more assertions about a subject is provided. The method includes obtaining, at an assertion directory access server and over a network, a first assertion about a first attribute of the subject from a first assertion issuer; obtaining, at the assertion directory access server and over a network, a second assertion about a second attribute of the subject from a second assertion issuer; and providing, from the assertion directory access server, the first assertion and the second assertion to an assertion directory authority server over a network..
Verisign, Inc.

Integrated-circuit radio

An integrated-circuit radio communication device (1) comprises a processor (7) having a hardware-interrupt input line; memory (13); radio communication logic (17); and interrupt-interface logic (8). The memory (13) contains a firmware module (23) comprising (i) instructions (31) for controlling the radio communication logic (17) according to a predetermined radio protocol, and (ii) an interrupt routine comprising instructions for receiving an identification of a radio communication function in the firmware module (23) and for invoking the identified radio communication function.
Nordic Semiconductor Asa

Microcontroller or microprocessor with dual mode interrupt

A microcontroller has a cpu with at least one interrupt input coupled with an interrupt controller, a plurality of peripherals, and a mode register comprising at least one bit controlling an operating mode of the microcontroller. The microcontroller is configured to operate in a first operating mode wherein upon assertion of an interrupt by a peripheral of the microcontroller, the interrupt controller forwards an interrupt signal to the cpu and the peripheral sets an associated interrupt flag, wherein the interrupt causes the cpu to branch to a predefined interrupt address associated with the interrupt input.
Microchip Technology Incorporated

System and implementing a hosted authentication service

A system, apparatus, method, and machine readable medium are described for a hosted authentication service. For example, one embodiment of a system comprises: a hosted authentication service to provide authentication services for relying parties, the hosted authentication service registering a relying party by sharing a key with the relying party; a first program code component inserted into an application hosted by the relying party, the first program code component causing a client device accessing the application to be redirected to the hosted authentication service for authentication-related functions; and the hosted authentication service transmitting one or more assertions to the relying party specifying authentication-related events occurring between the client device and the hosted authentication service, the relying party validating the assertions using the key..
Nok Nok Labs, Inc.

Shared gate fed sense amplifier

A first plurality of storage cells may be coupled to a first pair of data lines, and a second plurality of storage cells may be coupled to a second pair of data lines. Each storage cell in the first plurality of storage cells may be configured to generate a first output signal on the first pair of data lines in response to an assertion of a respective one of first plurality of selection signals, and each storage cell in the second plurality of storage cells may be configured to generate a second output signal on the second pair of data lines in response to the assertion of a respective one of a second plurality of selection signals.
Apple Inc.

System and method to support identity theft protection as part of a distributed service oriented ecosystem

A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in internet protocol (ip) multimedia subsystem (ims) and non-ims networks. The system includes an identity session initiation protocol (sip) application server configured to act as a security assertion markup language (saml) bridge, which allows an sip enabled device or a non-sip enabled device to attach to a telecommunications service provider network.
International Business Machines Corporation

Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)

A computer-implemented method for calculating an effect on timing of moving a pin from an edge position to an inboard position in processing large block synthesis (lbs). The method includes determining first timing details at the inboard position, based on internal wire segments between a signal source and the inboard position.
International Business Machines Corporation

Method for calculating an effect on timing of moving a pin from an edge to an inboard position in processing large block synthesis (lbs)

A computer-implemented method for calculating an effect on timing of moving a pin from an edge position to an inboard position in processing large block synthesis (lbs). The method includes determining first timing details at the inboard position, based on internal wire segments between a signal source and the inboard position.
International Business Machines Corporation

Method of and system for flame sensing and diagnostic

A method of determining presence of a flame in a furnace of a heating, ventilation, and air conditioning (hvac) system. The method comprises determining, using a controller, whether a processor signal (g) is active, responsive to a determination that the processor signal (g) is active, determining, using the controller prior to assertion of a flame-test input control signal, an output state of a first comparator, responsive to a determination that the output state of the first comparator is high, determining, using the controller prior to assertion of the flame-test input control signal, an output state of a second comparator, and responsive to a determination that the output state of the second comparator is low, transmitting, using the controller, a notification that a flame is present..
Lennox Industries Inc.

Cloud-based biometric enrollment, identification and verification through identity providers

A system and method for cloud-based biometric enrollment, identification and verification are disclosed. More specifically, a cloud-based system and method is used for enrollment of biometric templates.
Imageware Systems, Inc.

Methods and controlled recovery of error information between independently operable processors

Methods and apparatus for controlled recovery of error information between two (or more) independently operable processors. The present disclosure provides solutions that preserve error information in the event of a fatal error, coordinate reset conditions between independently operable processors, and implement consistent frameworks for error information recovery across a range of potential fatal errors.
Apple Inc.

Arbiter verification

Operation of an arbiter in a hardware design is verified. The arbiter receives a plurality of requests over a plurality of clock cycles, including a monitored request and outputs the requests in priority order.
Imagination Technologies Limited

Identity management and authentication system for resource access

A system that authorizes access to a resource by a client validates the client and generates a security assertion markup language (“saml”) assertion for the valid client. The system then sends an access request with the saml assertion to a oauth server.
Oracle International Corporation

Method for calibrating a clock signal generator in a reduced power state

Various embodiments of a clock generator are disclosed. An example system may include a functional unit, and a clock generation unit configured to adjust a frequency of an output clock signal responsive to an assertion of an enable signal from the functional unit.
Apple Inc.

Technologies for secure presence assurance

Technologies for secure presence assurance include a computing device having a presence assertion circuitry that receives an input seed value and generates a cryptographic hash based on the received input seed value. The computing device further verifies the integrity of the presence assertion circuitry based on the generated cryptographic hash..

Voltage level shifter for high voltage applications

A voltage level shifter for high voltage applications has a low voltage domain current mirror having first and second branches. A high voltage switch and a resistor are connected in series with the second branch.

Managing assertions while compiling and debugging source code

The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, while the ide tool is compiling the source code of a development project, the ide tool generates at least a first compiler warning.

Managing assertions while compiling and debugging source code

The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, while the ide tool is compiling the source code of a development project, the ide tool generates at least a first compiler warning.

Assertions based on recently changed code

The present disclosure relates to managing assertions in program source code in an integrated development environment (ide) tool. According to one embodiment, the ide tool receives a request to execute an application built from source code of a development project from a user interacting with an integrated development environment (ide) tool.

Assertions based on recently changed code

The present disclosure relates to managing assertions in program source code in an integrated development environment (ide) tool. According to one embodiment, the ide tool receives a request to execute an application built from source code of a development project from a user interacting with an integrated development environment (ide) tool.

Optimizing program performance with assertion management

The present disclosure relates to maintaining assertions in source code components of a development project by an integrated development environment (ide) tool. According to one embodiment, a request is received to build a software application generated from the development project.

Assertion management in an integrated development environment

The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, the ide receives a request to add an assertion at a specified location within source code of an application from a user interacting with an integrated development environment (ide) tool.

Optimizing program performance with assertion management

The present disclosure relates to maintaining assertions in source code components of a development project by an integrated development environment (ide) tool. According to one embodiment, a request is received to build a software application generated from the development project.

Managed assertions in an integrated development environment

The present disclosure relates to maintaining assertions in an integrated development environment (ide) tool. According to one embodiment, the ide receives a request to add an assertion at a specified location within source code of an application from a user interacting with an integrated development environment (ide) tool.

Location-enforced data management in complex multi-region computing

A location-reporting request is sent by a processor to at least one remote server. The location-reporting request requests processing of data away from a geo-location-aware client device and instructs any available server to respond with a reported geographic location.
International Business Machines Corporation

Method for authenticating a user, corresponding server, communications terminal and programs

A method is provided for authenticating a user's communications terminal with an authentication server connected to a gateway terminal by using a communications network. The method includes: obtaining a piece of data representing an identity of the user from the gateway terminal; configuring, by the authentication server, a data transmission link between the authentication server and the terminal, using a predefined data transmission interface of the gateway terminal and as a function of the piece of data representing the identity of the user; transmitting, by the authentication server, to the terminal, a piece of encrypted data for checking authentication, using the data transmission link; receiving, by the authentication user, coming from the terminal, a piece of encrypted data for counter-checking authentication; issuing an assertion of authentication of the user when the piece of data for the counter-checking of authentication corresponds to the piece of data for checking authentication..
Ingenico Group

Method and device for real-time knowledge processing based on an ontology with temporal extensions

Embodiments are directed towards a method and a computer server for receiving assertions, wherein an assertion can have a functional property such that for a given subject and a given property the object has a single value at any time, maintaining a knowledge base that includes a history table that stores previously received assertions, the method comprising selecting an assertion for processing, generating an assertion tuple that corresponds to the selected assertion, determining that the property of the selected assertion is functional; and writing the assertion tuple to the history table.. .
Smartcloud, Inc.

Method of privacy preserving during an access to a restricted service

The present invention relates to a method of privacy-preserving during an access to a restricted e-service requiring user private data from a smart card. The invention relates more particularly to the field of methods implemented so that the user has the guarantee that only the private data needed to access to the e-service are extracted from the smart card.
Gemalto Sa

Redirect to inspection proxy using single-sign-on bootstrapping

An authentication request is generated when a user of a client device attempts to initiate a user session with an application managed by a service provider. An authentication response is generated based on credentials received from the user.
Cisco Technology, Inc.

Handling blind statements in mixed language environments

This application discloses a computing system configured to determine that a first bind command is configured to prompt instantiation of an assertion module in a target module of a circuit design, which creates a mixed-language environment for the circuit design. The computing system, in response to the determination that the first bind command is configured to create the mixed-language environment for the circuit design, configured to generate a wrapper module configured to prompt instantiation of the assertion module in the wrapper module.
Mentor Graphics Corporation

Identity assertion based on biometric information

A method and apparatus for providing a lifetime extension to an identity assertion is provided herein. During operation a user will authenticate to an identity management server (also known as an authorization server or an authentication server) to obtain an identity assertion.
Motorola Solutions, Inc.

Systems and methods for system login and single sign-on

Systems and methods for system login and single sign-on are described. A first application of a first system receives a request to access a protected application of a second system.
Openlane, Inc.

System and providing a health determination service based on user knowledge and activity

Examples are provided herein for providing a service in connection with determining a health of a user. A collection of questions are stored for the user, with each question being based on a documented assertion pertaining to human health.
Health Equity Labs

System on chip i/o connectivity verification in presence of low power design considerations

Formal verification of connectivity of a circuit, for example, a circuit representing a system on chip i/o ring is performed with low power considerations. The formal verification determines whether the connectivity of a circuit remains valid when low power design specification is introduced.
Synopsys, Inc.

Object restraint systems and methods of operation thereof

Embodiments include object restraint systems and methods of their operation. The system is contained in a vehicle with a passenger compartment, and includes sensor and processing subsystems, a vessel, a restraint mechanism, and an actuator.
Freescale Semiconductor, Inc.

System and single sign-on technical support access to tenant accounts and data in a multi-tenant platform

Shown is single sign-on support access to tenant accounts in a multi-tenant service platform involving a proxy user account in an identity provider for a tenant account on the service platform having security metadata associated therewith, mapping in the identity provider maps a support user to a proxy user identifier, a corresponding security endpoint in the service platform and mapping of the proxy user account identifier to the tenant account and security metadata. The identity provider authenticates a request to access the tenant account on the service platform, obtains the security credentials for the proxy user identifier, and sends a security assertion with the proxy user identifier and the security metadata to the security endpoint.
Zuora, Inc.

Igniter and vehicle, and controlling ignition coil

An igniter that includes switch element and switch control device for controlling the switch element depending on ignition signal. The switch control device includes a determination stage that compares voltage associated with the ignition signal with a predetermined voltage to generate a determination signal, a driving stage that controls on/off operations of the switch element depending on the determination signal, a timer circuit that asserts a conduction protection signal when state where the determination signal becomes an assert level corresponding to an on operation of the switch element continues for predetermined time, a time-varying voltage generating circuit that generates time-varying voltage over time in response to the assertion of the conduction protection signal, and an amplifier that changes the voltage of a control terminal of the switch element such that detection voltage associated with coil current flowing in the switch element is close to the time-varying voltage..
Rohm Co., Ltd.



Assertion topics:
  • Social Networking
  • Social Network
  • Networking
  • Machine Learning
  • Repository
  • Clock Divider
  • High Speed
  • Graphics Processing Unit
  • Interactive
  • Breakpoint
  • Concurrent
  • Concurrency
  • Expressions
  • Deasserted
  • Storage Device


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.1023

    file did exist - 2562

    1 - 1 - 57