FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Assertion topics
Social Networking
Social Network
Networking
Machine Learning
Repository
Clock Divider
High Speed
Graphics Processing Unit
Interactive
Breakpoint
Concurrent
Concurrency
Expressions
Deasserted
Storage Device

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Assertion patents



      
           
This page is updated frequently with new Assertion-related patent applications. Subscribe to the Assertion RSS feed to automatically get the update: related Assertion RSS feeds. RSS updates for this page: Assertion RSS RSS


Mesh grid protection system

Mesh grid protection system

Interrupt based power state management

Interrupt based power state management

Interrupt based power state management

Method and apparatus pertaining to dynamically determining entered telephone numbers

Date/App# patent app List of recent Assertion-related patents
10/23/14
20140317044
 Method and device for real-time knowledge processing based on an ontology with temporal extensions patent thumbnailMethod and device for real-time knowledge processing based on an ontology with temporal extensions
Embodiments are directed towards a method and a computer server for receiving assertions, wherein an assertion can have a functional property such that for a given subject and a given property the object has a single value at any time, maintaining a knowledge base that includes (1) a history table that stores previously received assertions, and (2) a snapshot table that stores currently valid assertions, maintaining a snapshot cache in memory that stores a subset of the assertions in the snapshot table, initiating a processing cycle, selecting an assertion for processing, generating an assertion tuple that corresponds to the selected assertion, determining that the property of the selected assertion is functional, writing a retraction tuple to the history table, writing the assertion tuple to the snapshot table; and writing the assertion tuple to the history table.. .
10/16/14
20140310826
 Mesh grid protection system patent thumbnailMesh grid protection system
A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid.
10/16/14
20140310540
 Interrupt based power state management patent thumbnailInterrupt based power state management
A method and apparatus for power managed interrupt handling is disclosed. In one embodiment, a system includes one or more agents that may invoke an interrupt request.
10/16/14
20140306896
 Method and apparatus pertaining to dynamically determining entered telephone numbers patent thumbnailMethod and apparatus pertaining to dynamically determining entered telephone numbers
As keys of the keyboard of a portable communication device are asserted, the device dynamically determines at least a portion of a corresponding telephone number to present on the device's display by, at least in part, considering likelihoods of differing explicit and implicit interpretations of these key assertions. By one approach this can comprise according a likelihood advantage to an explicit interpretation of one or more of the key assertions and/or implicit interpretations of such key assertions.
10/09/14
20140304776
 Methods and apparatus for managing network traffic patent thumbnailMethods and apparatus for managing network traffic
Methods, apparatus, and computer readable storage medium for authenticating assertions of a source are disclosed. In one aspect, a method for authenticating an assertion of a source in an environment of distributed control include receiving a notification of the assertion; determining an entity responsible for maintaining an authenticated list of assertions by the source based on a first trusted public record, determining an assertion authenticator for the entity based on a second trusted public record, determining one or more assertions of the source from the assertion authenticator, and authenticating the assertion based on the determined one or more assertions..
10/02/14
20140297356
 System and method for customer onboarding patent thumbnailSystem and method for customer onboarding
A system and method of performing customer onboarding may include accessing business data derived from compliance documents of a potential customer in a nosql database. Grouped assertions in a computer-executable format may be caused to be applied to the business data in a sequence.
10/02/14
20140294204
 Audio amplifier mode transition patent thumbnailAudio amplifier mode transition
An audio amplifier is to transition between a power-down mode and an active mode, based on assertion and deassertion of a power down signal. A power down control module is to selectively assert and deassert the power down signal to the audio amplifier.
09/25/14
20140288910
 System, method and apparatus for causal implication analysis in biological networks patent thumbnailSystem, method and apparatus for causal implication analysis in biological networks
Described are methods, systems and apparatus for hypothesizing a biological relationship in a biological system. A database of biological assertions is provided consisting of biological elements, relationships among the biological elements, and relationship descriptors characterizing the properties of the elements and relationships.
09/25/14
20140286649
 Signal level detect circuit with reduced loss-of-signal assertion delay patent thumbnailSignal level detect circuit with reduced loss-of-signal assertion delay
A signal level detect circuit configured to assess an input signal with varying amplitude signal levels and to generate an indicator signal includes an input circuit configured to receive the input signal and to process the input signal, the input circuit including a first node on which the input signal is sampled; a comparator configured to compare the processed input signal to a signal level threshold and generate a comparator output signal; and an active discharge circuit configured to provide a first discharge current to the first node in response to the comparator output signal. The comparator output signal changes from a low output state to a high output state in response to the comparator input signal, and the active discharge circuit generates the first discharge current to discharge the sampled input signal on the first node after the comparator output signal changes to the high output state..
09/18/14
20140282903
 Managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media patent thumbnailManaging identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media
Embodiments include managing identity provider (idp) identifiers for web real-time communications (webrtc) interactive flows, and related methods, systems, and computer-readable media. In one embodiment, a method for managing idps comprises selecting, by a webrtc client executing on a computing device, one or more preferred idp identifiers indicated by one or more preferences from a plurality of idp identifiers corresponding to a plurality of idps for providing identity assertions during an establishment of a webrtc interactive flow.
09/18/14
20140282837
Privacy verification tool
Systems and methods for protecting the privacy of users by controlling access to the users' data. In particular, some embodiments provide for a higher-level declarative language for expressing privacy policies which can be verified using a computer-aided verification tool.
09/18/14
20140282321
System and method for a hybrid clock domain crossing verification
A method of hybrid clock domain crossing (cdc) verification includes receiving a design or an integrated circuit (ic) design constraints. Static cdc verification is performed, including structural and functional verification.
09/18/14
20140279906
Apparatus, system and method for multiple source disambiguation of social media communications
The present invention is directed to a system for understanding social media. The system may provide automated machine understanding of social media communications based on: social media assertions, social media statements and conversations, social connections, user profile info, crowd-sourced databases, internet pages, and semantic networks..
09/18/14
20140266632
Method and apparatus pertaining to rfid tag-based user assertions
An apparatus includes a display and one or more user-assertable surfaces. When asserted by a user, such a surface selectively couples a corresponding near-field rfid tag to a far-field component such that information stored by the near-field rfid tag is transmitted via the far-field component.
09/11/14
20140255898
Assessing reading comprehension and critical thinking using annotation objects
A competency assessment system enables reading comprehension and critical thinking skills of a knowledge worker to be assessed. The competency assessment system enables a knowledge worker to create an assertion map based on one or more source literals.
09/04/14
20140250414
Method for measuring assertion density in a system of verifying integrated circuit design
Thereafter, simulation traces for the rtl are received and the number of predicates satisfiable on the simulation traces is computed. A figure of merit of assertion density is determined from the ratio of the respective numbers of predicates.
09/04/14
20140249782
Dynamic power prediction with pin attribute data model
Systems and methods are provided for modeling the power consumption of intellectual property (ip) components of a chip by defining how individual pins operate in a particular application. A method is provided for performing a power analysis of an ip design.
08/28/14
20140245389
System and method for proxying federated authentication protocols
A system and method that include receiving a service provider identity request through a federated authentication protocol; transmitting a proxy identity request to a configured identity provider; receiving an identity assertion; facilitating execution of a second layer of authentication; determining a proxy identity assertion based on the identity assertion and the second layer of authentication; and transmitting the proxy identity assertion to the service provider.. .
08/28/14
20140244233
Executing a hardware simulation and verification solution
One embodiment of the present invention provides systems and techniques to execute a hardware simulation and verification solution on a multiprocessor system. The hardware simulation and verification solution can be partitioned into different modules which can include a simulation kernel to simulate changes in signal values, a value change dump module to store the changes in the signal values on a computer-readable storage medium, a functional coverage module to check functionality, a toggle coverage module to check signal toggling, an assertion engine to check complex behaviors, and a testbench module to generate test scenarios.
08/14/14
20140229755
Pulse width modulation load share bus
Power supply modules have outputs coupled in parallel and convey load share balancing information over a single wire load share bus. Pulse width modulation (pwm) signals represent output loading of each of the power supply modules over the single wire load share bus.
08/14/14
20140229596
Dynamic generation of policy enforcement rules and actions from policy attachment semantics
At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.
08/14/14
20140229595
Policy assertion linking to processing rule contexts for policy enforcement
A selectable policy enforcement mode of a policy enforcement point (pep) is configured that, based upon a selected policy enforcement mode, selectively modifies an input message processing context. The selectively modified input message processing context is used to invoke policy enforcement rules from multiple policy domains to implement one of independent policy enforcement and sequential cascaded policy enforcement of the policy enforcement rules from the multiple policy domains.
08/14/14
20140229593
Dynamic generation of policy enforcement rules and actions from policy attachment semantics
At least one defined service policy to be enforced by a policy enforcement point (pep) is obtained. The obtained at least one defined service policy is parsed to identify at least one set of enforceable policy provisions and the at least one set of enforceable policy provisions is identified.
08/07/14
20140223059
Write transaction interpretation for interrupt assertion
A method and circuit for a data processing system (12) provide a virtualized programmable interrupt control system (70) which processes interrupt event reports from interrupt sources (e.g., 14, 40) which generate write transactions to an address for an interrupt event register (80) which is authenticated and then interpreted based on the current state of the targeted interrupt to generate the next state using an interpretation table (306) and predetermined configuration/state bits (310-314).. .
07/31/14
20140215578
Adaptive audiences for claims in a social networking system
A social graph may be modeled as a collection of claims. Each claim is associated with an author, an audience, and an assertion about a fact.
07/24/14
20140208431
Automated tools for building secure software programs
A computer implemented tool is described that includes an assertion generator module that can automatically generate assertions, which are usable to verify application-specific security properties, for a computer software program. An assertion checker module can automatically analyze the computer software program to ensure that it satisfies the application-specific security properties.
07/24/14
20140208149
Apparatus and method for dynamically aligned source synchronous receiver
An apparatus including a synchronous lag receiver that receives one of a plurality of radially distributed strobes and a data bit, and that delays registering of the data bit by a propagation time. The synchronous lag receiver has a first plurality of matched inverters, a first mux, and a bit receiver.
07/24/14
20140208148
Automatic source synchronous bus signal alignment compensation mechanism
An apparatus including a joint test action group (jtag) interface and a bit lag control element. The jtag interface receives information that indicates an amount to adjust a propagation time.
07/24/14
20140208147
Apparatus and method for locally optimizing source synchronous data strobes
An apparatus is provided that compensates for misalignment on a synchronous data bus. The apparatus includes a bit lag control element and a synchronous lag receiver.
07/24/14
20140207766
Assertion quality assessment and management system
An assertion assessment system is presented. An assertion object that represents a relationship between an assertion and an information source can be bound to a quality measure as an indication of the quality of the assertion object.
07/24/14
20140207735
Apparatus and method for dynamic alignment of source synchronous bus signals
An apparatus that compensates for misalignment on a synchronous data bus. The apparatus includes a replica distribution network, a bit lag control element, and a synchronous lag receiver.
07/24/14
20140204691
Source synchronous bus signal alignment compensation mechanism
An apparatus having a bit lag control element that measures a propagation time beginning with assertion of a first signal and ending with assertion of a second signal, and that generates a first value indicating an adjusted propagation time. The control element includes delay lock control, adjust logic, and a gray encoder.
07/17/14
20140201809
Characteristics of security associations
Authentication of a user or a wireless transmit/receive unit may be based on an obtained measure of authentication strength, which may referred to as an assurance level. For example, a user, via a wtru, may request access to a service controlled by an access control entity (ace).
07/17/14
20140201083
System and method for offering a multi-partner delegated platform
A system and method for offering a delegated platform that includes configuring a partner key of a partner record on a service platform with a partner; creating an account scoped within the partner record; receiving a session authentication request that specifies a partner assertion of a partner authenticated session request of the account; authenticating the session authentication request with the partner key; and rendering an embeddable account portal with a session of the account.. .
07/10/14
20140195539
System and method for automatically generating systematic reviews of a scientific field
A system and method are provided for automatically generating systematic reviews of received information in a field of science and technology, such as scientific literature, where the systematic review includes a systematic review of a research field in the scientific literature. The method includes the steps of constructing a time series networks of words, passages, documents, and citations and/or co-citations within received information into a synthesized network, decomposing the networks into clusters of fields or topics, performing part-of-speech tagging of text within the received information to provide tagged text, constructing semantic structures of concepts and/or assertions extracted from the source text, generating citation-based and content-based summaries of the clusters of fields or topics and the semantic structures, and generating structured narratives of the clusters of fields or topics and the summaries of the generated semantic structures.
07/03/14
20140189827
System and method for scoping a user identity assertion to collaborative devices
A system and method for enabling a primary and a secondary communication device to share a user identity assertion is presented. The user identity assertion enables the devices to access an application system.
06/26/14
20140181925
Privacy enhanced key management for a web service provider using a converged security engine
In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication.
06/19/14
20140172732
Psychographic based methods and systems for job seeking
A computer-implemented method for job seeking is disclosed. The method includes receiving a user request to search job openings, which request includes desired work field and user education information.
06/12/14
20140165139
Security language translations with logic resolution
Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs.
06/12/14
20140164843
System, method and computer program product for debugging an assertion
In accordance with embodiments, there are provided mechanisms and methods for debugging an assertion. These mechanisms and methods for debugging an assertion can enable improved interpretation and analysis of data validation results, more efficient development associated with data validation, etc..
06/12/14
20140164661
Methods and systems for time keeping in a data processing system
Data processing systems with interrupts and methods for operating such data processing systems and machine readable media for causing such methods and containing executable program instructions. In one embodiment, an exemplary data processing system includes a processing system, an interrupt controller coupled to the processing system and a timer circuit which is coupled to the interrupt controller.
06/05/14
20140156437
System and method for generating a narrative summary
A method and system for automatically generating a self-updating naturally-reading narrative product summary including assertions about a selected product. In one embodiment, the system and method includes evaluating an existing narrative product summary, comparing an existing attribute name, attribute value, attribute unit, and assertion model, respectively, to a current attribute name, attribute value, attribute unit, and assertion model to determine if one of the comparisons shows a change.
05/29/14
20140149439
Dfa-nfa hybrid
Disclosed is a hybrid architecture combining dfa and nfa based engines. The dfa engine and nfa engine scan the same input stream.
05/29/14
20140147081
Connector systems having receptacle assembly and plug assembly
A data center connector (dcc) system includes a receptacle connector assembly that includes a receptacle body having a plug receiving end, a panel assertion end and a plug receiving chamber at the plug receiving end that receives a plug body of a plug connector assembly. A receptacle ferrule is located in the receptacle body.
05/29/14
20140145699
Systems and methods for controlling power in semiconductor circuits
A power control circuit includes a plurality of transistors coupled between a power supply node and a gated power supply node, wherein the gate electrode of a first transistor of the plurality of transistors is coupled to receive a power control signal, wherein, in response to assertion of the power control signal, the first transistor is placed into a conductive state; a first voltage comparator, wherein, in response to assertion of the power control signal, places a second transistor of the plurality of transistors in a conductive state when a voltage on the gated voltage supply node reaches a first reference voltage; and a second voltage comparator, wherein, in response to assertion of the power control signal, places a third transistor of the plurality of transistors in a conductive state when the voltage on the gated voltage supply node reaches a second reference voltage different from the first reference voltage.. .
05/08/14
20140129592
Build pooled data source based on hana saml login
A system receives a request from a request processor of a database connection pool to access a database. The system determines whether a database connection from the database connection pool is available for the request.
05/08/14
20140125381
Voltage-aware signal path synchronization
An integrated circuit (ic) generates clock delay control signals based on its operational voltage level. The clock delay control signals are routed to corresponding clock gating logic that controls the synchronous capturing of the outputs of corresponding signal paths.
05/01/14
20140123264
Domain based authentication scheme
In one example, a system for authenticating domains operates by authenticating a first domain and the extensions that make up the uri of an initial or primary internet network call. Thereafter, the system can enable the owner of the first domain to make assertions or statements about additional domains and uris that make up the rest of the web page, session or application..
04/24/14
20140114949
Knowledge management system
A system includes a memory operable to store an ontology and a search index. The system also includes a data agent operable to generate a knowledge assertion by parsing one or more data elements retrieved from a data source.
04/24/14
20140114903
Knowledge management engine for a knowledge management system
A system includes a memory operable to store an ontology. The ontology includes a plurality of instances, and a plurality of relationships between the instances.
04/24/14
20140114902
Intelligent data agent for a knowledge management system
A system includes a memory operable to store one or more classification rules. The system also includes a processor communicatively coupled to the memory.
04/10/14
20140101743
Method for authenticating a user to a service of a service provider
Methods, devices, and computer programs for an authentication of a user to a service of a service provider are disclosed. Access for the user to the service of the service provider is requested.
04/10/14
20140101679
Secure transfer of credit card information
A method includes receiving, at a video service provider system, a security markup assertion language (saml) token encrypted for a partner federated security token service (fsts) device from a client device. The method includes submitting the saml token to the partner fsts device in exchange for a partner saml token.
04/10/14
20140101640
White-box testing systems and/or methods for use in connection with graphical user interfaces
Certain example embodiments relate to white-box testing techniques, e.g., for graphical user interfaces (guis). A test case to be run on the application includes interactions between the application and external components that were gathered as the application ran and received user input from a user until a desired test state was reached, and assertions to be made to the application once that state is reached.
04/10/14
20140101629
Early design cycle optimzation
Some example embodiments include a computer-implemented method for designing an integrated circuit. The computer-implemented method includes receiving a hierarchical network design for the integrated circuit, wherein the hierarchical design comprises a number of components that are coupled together.
04/10/14
20140101352
Interrupt controller, apparatus including interrupt controller, and corresponding methods for processing interrupt request event(s) in system including processor(s)
An interrupt controller coupled to a plurality of processors is provided to rout at least one interrupt request event to at least one of the processors. The interrupt controller includes a receiving circuit and a controlling circuit.
03/27/14
20140090093
Mesh grid protection system
A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines.
03/27/14
20140084976
Delay-locked loop with dynamically biased charge pump
A delay-locked loop, including a phase detector configured to receive two signals, one of the signals being delayed relative to the other of the signals, the phase detector having an up output and a down output. The delay-locked loop also includes a charge pump system operatively coupled with the phase detector, the charge pump system including (1) a charge pump configured to be responsive to assertion of actuating signals from the up output and the down output so as to control pumping of charge from the charge pump system, such pumped charge being usable to control a delay line carrying one of the two signals, so as to control relative delay occurring between the two signals; and (2) a feedback control loop configured to dynamically adjust at least one bias signal at the charge pump so as to minimize net charge pumped from the charge pump system during simultaneous assertion of actuating signals from the up output and the down output..
03/20/14
20140082067
Sharing asserted media
Concepts and technologies are disclosed herein for sharing asserted media. An assertion application can be executed by a device to generate asserted media.
03/20/14
20140078072
Method and apparatus pertaining to the display and acceptance of predicted text
An electronic device is configured to display text as entered by a user and to provide predicted words in response to that entered text. The device displays only one of the predicted words on the display at a time, in-line with the text being entered by the user, to thereby provide an opportunity for the user to accept the one predicted word.
03/13/14
20140075540
Geographic filter for regulating inbound and outbound network communications
A system and method for regulating and analyzing inbound and outbound communications in and between computer networks on the basis of geographic security assertions are provided. Geographic information is collected, optimized, and shared between network objects to enforce network access control on the basis of configurable security assertions.
03/13/14
20140075421
Apparatus and method for generating assertion based on user program code, and apparatus and method for verifying processor using assertion
Exemplary embodiments disclose a method for generating an assertion based on a user program code. The method may include receiving a user program comprising at least one assertion directive, a compiled result of the user program, and architecture information of a processor, and generating, based on the compiled result of the user program and the architecture information of the processor, an assertion which states an operation that the processor needs to perform in accordance with a code of the user program indicated by each of the at least one assertion directive..
03/13/14
20140075188
Trusted third party client authentication
A method includes receiving, at a video service provider system, a request for an online video session from a third party device with a security markup assertion language (saml) token as an input, decrypting a saml assertion in the saml token with a private key associated with the video service provider system, validating the saml assertion based on a third party public key associated with the third party sts, and retrieving a third party account user identifier and a device type. The method also includes identifying a link time based on the third party account user identifier, identifying a password change time (pct) stamp associated with the service provider user account, and providing the online video session to the third party device in response to determining that the pct stamp is not later than the link time..
03/06/14
20140067408
Systems and methods for use in training medical treatments to healthcare professionals
A medical event information system includes at least one client computer, a memory area configured to store at least one property of an object, and a server system communicatively coupled to the client computer and the memory area. The memory area is configured to store data associated with a plurality of medical events, wherein each medical event resulted in a legal assertion being made by a patient following a surgical procedure.
02/13/14
20140047532
Secure mobile client with assertions for access to service provider applications
A software-as-a-service (saas) access control application on a client device is configured with a certificate that identifies a user, and with configuration information for one or more saas applications to access, and including an idp identifier for the saas application. The saas access control application includes software to be inserted into a network software stack of the client device and software configured to serve as an identity provider for assertions.
02/13/14
20140046647
Active trace assertion based verification system
A method is presented for responding to user input by displaying when a circuit has a property expressed by an assertion based on data indicating values of signals of the circuit at a succession of times. The assertion expresses the property as a first sequence of expressions, and separately defines for each expression a corresponding evaluation time relative to the succession of times at which the expression is to be evaluated.
02/13/14
20140046459
Achieving best effort performance with interfering communications system equipment
Primary and secondary apparatuses avoid concurrent performance of activities, wherein the secondary apparatus has a best and possibly different worst case minimum amounts of time required to perform activity. The primary apparatus ascertains a first future moment when it will become inactive and ascertains whether its upcoming period of inactivity will not be less than the secondary apparatus' best case minimum amount of time required to perform activity.
02/06/14
20140040865
System and method for using an abstract syntax tree to encapsulate the descriptive assertions in an annotation based standard into a code based library
A system and method can support compliance tests with annotation based standards using an expectation library. The expectation library can convert one or more descriptive assertions into a structured data model, wherein the one or more descriptive assertions describe one or more annotations.
02/06/14
20140040864
System and method for using a shared standard expectation computation library to implement compliance tests with annotation based standard
A system and method can implement compliance tests with annotation based standards using a model library. The model library encapsulates expectation computation logic described in one or more annotation based assertions.
02/06/14
20140040471
Systems and methods for enabling coexistence of multiple wireless components operating in the same frequency band
Methods and systems for enabling coexistence of multiple potentially interfering wireless components in a device are provided. A device may include a wireless module using a proprietary protocol and one or more modules using standardized protocols.


Popular terms: [SEARCH]

Assertion topics: Social Networking, Social Network, Networking, Machine Learning, Repository, Clock Divider, High Speed, Graphics Processing Unit, Interactive, Breakpoint, Concurrent, Concurrency, Expressions, Deasserted, Storage Device

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Assertion for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Assertion with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



1.5602

3237

3 - 0 - 72