Patent application number | Description | Published |
20140351446 | ELECTRONIC DEVICE USING LOGICAL CHANNELS FOR COMMUNICATION - An apparatus and method for providing one or more protocols for one or more electronic devices are provided. The method includes establishing, by an electronic device configured to provide a framework interface by executing instructions stored in a memory, one or more physical channels with an external electronic device, using one or more communication modules, executing, by the electronic device, two or more application programs to interface with the framework interface, and communicating, via the framework interface, data from the two or more application programs through the one or more physical channels to the external electronic device, using at least one logical channel or session for a respective one of the two or more application programs. | 11-27-2014 |
20140351832 | ELECTRONIC DEVICE USING FRAMEWORK INTERFACE FOR COMMUNICATION - An apparatus and method for providing one or more protocols for one or more electronic devices are provided. The method includes establishing, by an electronic device configured to provide a framework interface by executing instructions stored in a memory, one or more physical channels with an external electronic device, using one or more communication modules, executing, by the electronic device, two or more application programs to interface with the framework interface, and communicating, via the framework interface, data from the two or more application programs through the one or more physical channels to the external electronic device, using at least one logical channel or session for a respective one of the two or more application programs. | 11-27-2014 |
Patent application number | Description | Published |
20090155761 | Method for Producing Reticulocyte Lysate and Uses Thereof - Methods for producing substantially pure porcine reticulocyte lysate are provided. In one embodiment, the methods include inducing a reduction in the hematocrit of a pig to a level of between about 20% and about 25%; extracting at least a portion of blood from the pig; isolating a fraction of the blood containing substantially red blood cells; and preparing a porcine reticulocyte lysate preparation from the isolated fraction. | 06-18-2009 |
20100211327 | Methods and Systems for Viral Diagnosis - Methods, apparatus, and software for identifying sets of genomic oligonucleotides that identify a viral family and for determining sets of probes and primers that can be used to identify members of viral families in a sample are provided. In one embodiment, the method of the present invention includes normalizing viral genomic oligonucleotide sequence data from at least one viral family, and identifying at least one oligonucleotide sequence that is unique to each viral family. An array of the identified oligonucleotide sequences is made. Primers provided by the present invention are used to amplify viral family genomic sequences in a biological sample of interest, and probes provided using the present invention, e.g., attached to an array or biochip, are then used to detect the presence of the corresponding virus(es) present in the sample by hybridization. | 08-19-2010 |
20110178071 | Antiviral Treatments - Compounds and methods for preventing and treating viral infections are provided. In some embodiments, novel compounds broad-spectrum antiviral activity are provided. In more specific embodiments, the compounds and methods are effective against viruses such as Venezuelan Equine Encephalitis, West Nile Virus, and Hepatitis C. | 07-21-2011 |
20120157435 | Antiviral Compounds - Compounds and methods for preventing and treating viral infections are provided. In some embodiments, novel compounds broad-spectrum antiviral activity are provided. In more specific embodiments, the compounds and methods are effective against viruses such as Venezuelan Equine Encephalitis, West Nile Virus, and respiratory viruses including the common cold. | 06-21-2012 |
20120238543 | Antiviral Compounds - Novel compounds, methods, and compositions for treating various viral infections are described. In some embodiments the novel compounds of the invention are 3-oxo-phenothiazine derivatives; more specific embodiments include 3-oxo-phenothiazine derivatives having substituents at the 1-, 7-, and 9-positions of the phenothiazine parent ring. In other embodiments, the invention provides compositions and methods for treating viral infections, especially HIV. | 09-20-2012 |
20120270854 | Antiviral Compounds - Compounds and methods for preventing and treating viral infections are provided. In some embodiments, novel compounds broad-spectrum antiviral activity are provided. In more specific embodiments, the compounds and methods are effective against viruses such as Venezuelan Equine Encephalitis, West Nile Virus, and Hepatitis C. | 10-25-2012 |
20120302556 | Antiviral Compounds - Compounds and methods for preventing and treating viral infections are provided. In some embodiments, novel compounds broad-spectrum antiviral activity are provided. In more specific embodiments, the compounds and methods are effective against viruses such as Venezuelan Equine Encephalitis, West Nile Virus, and Hepatitis C. | 11-29-2012 |
20140315897 | COMPOUNDS, COMPOSITIONS, AND METHODS FOR TREATING ALZHEIMER'S DISEASE - Novel methods and compounds for treating Alzheimer's Disease are provided. In one aspect, the invention provides methods for treating Alzheimer's Disease by administering certain phenothiazine derivatives. In one embodiment, the methods include administering an effective amount of a 3-oxo-7-dialkyl-amino-phenothiazine derivative, or 3-oxo-7-dialkyl-amino-phenothiazine. In another embodiment, the invention provides methods for treating Alzheimer's Disease by administering an effective amount of a 3,7-diazetidin-1-yl-phenothiazine or a derivative thereof. In another aspect, the invention provides novel azetidinyl phenothiazine compounds. | 10-23-2014 |
Patent application number | Description | Published |
20080222697 | Application Server Object-level Security for Distributed Computing Domains - Objects on application servers may be defined into classes which receive different levels of security protection, such as definition of user objects and administrative objects. Domain-wide security may be enforced on administrative objects, which user object security may be configured separately for each application server in a domain. In a CORBA architecture, IOR's for shared objects which are to be secured on a domain-wide basis, such as administrative objects, are provided with tagged components during IOR creation and exporting to a name server. Later, when the IOR is used by a client, the client invokes necessary security measures such as authentication, authorization and transport protection according to the tagged components. | 09-11-2008 |
20080222719 | Fine-Grained Authorization by Traversing Generational Relationships - Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource, and locating, based on the request, the resource in both a containment relationship graph and in a structure having groupings of resources, wherein the groupings comprise a grouping having the resource. Further, the embodiment includes traversing a vertex of the containment relationship graph, wherein the vertex comprises a generational resource of the resource, and reading an authorization table associated with a grouping having the generational resource in the groupings. Further still, the embodiment includes determining whether to grant the access rights for performing the action on the resource. | 09-11-2008 |
20090037196 | DETERMINING WHETHER A POSTAL MAIL ITEM CONTAINING A RADIO FREQUENCY IDENTIFIER (RFID) IS JUNK MAIL - A method, computer program product, and apparatus for receiving a postal mail item. The postal mail item is received. The postal mail item contains a radio frequency identifier identifying the sender of the postal mail item. Responsive to receiving the postal mail item in the mailbox, the radio frequency identifier of the postal mail item is scanned with a scanner to identify the sender of the postal mail item. A determination is made whether the sender of the postal mail item is in a junk mail list. The junk mail list includes a list of senders accessible to a processor in the scanner. | 02-05-2009 |
20120047258 | Managing and Securing Manageable Resources in Stateless Web Server Architecture Using Servlet Filters - Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein the application program component receives and processes the user request. | 02-23-2012 |
20130007845 | Authentication and authorization methods for cloud computing security platform - An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud. | 01-03-2013 |
20130311632 | CLOUD COMPUTING DATA CENTER MACHINE MONITOR AND CONTROL - Systems, methods and computer-readable media provide for identifying a physical machine corresponding to a virtual machine. A system assigns a data center machine identifier to a physical computing device in a data center, along with a physical location for the physical computing system. In response to creating a virtual machine on the physical computing device, the system creates a mapping from a virtual machine identifier for the virtual machine to the data center machine identifier for the physical computing system. | 11-21-2013 |
20130346543 | CLOUD SERVICE SELECTOR - In a method for selecting a remote application service from a plurality of remote application services containing a requested electronic resource, a computer receives a request for an electronic resource. The computer sends a request for a geographic location of each node in the plurality of nodes containing the electronic resource. The computer determines a distance between the geographic location of each node in the plurality of nodes and the geographic location of the origin of the request for the electronic resource, respectively. The computer selects a remote application service based at least partially on the distance between the geographic location of each node and the geographic location of the origin of the request for the electronic resource. | 12-26-2013 |
20150222626 | Managing and Securing Manageable Resources in Stateless Web Server Architecture Using Servlet Filters - Access is controlled to managed resources in a stateless web server architecture including a stateless web server computing platform; a resource locator map portion of the stateless web server computing platform providing a unique resource locator code representing each managed resource in a stateless web server architecture, wherein the managed resource is assigned to a plurality of application program components; a set of servlet filters disposed in a portion of the stateless web server computing platform, each servlet filter associated with one of the application program components; a resource locator matcher portion of the stateless web server computing platform, responsive to a user request to a unique resource locator, matching a pattern in the user request to one or more of the application program components using a corresponding servlet filter; and a request dispatcher portion of the stateless web server computing platform sending the user request to the matched application program component, wherein the application program component receives and processes the user request. | 08-06-2015 |