Patent application number | Description | Published |
20080247964 | SUBSTITUTED AZASPIRO DERIVATIVES - Substituted azaspiro derivatives of the Formula: | 10-09-2008 |
20090069347 | 2-phenoxy pyrimidinone analogues - 2-Phenoxy pyrimidinone analogues are provided, of the Formula: | 03-12-2009 |
20090176980 | 3-Substituted-6-Aryl Pyridines - 3-substituted-6-aryl pyridines of Formula I are provided: | 07-09-2009 |
20090286767 | SUBSTITUTED QUINOLIN-4-YLAMINE ANALOGUES - Substituted quinolin-4-ylamine analogues are provided. Such compounds are ligands that may be used to modulate specific receptor activity in vivo or in vitro, and are particularly useful in the treatment of conditions associated with pathological receptor activation in humans, domesticated companion animals and livestock animals. Pharmaceutical compositions and methods for using them to treat such disorders are provided, as are methods for using such ligands for receptor localization studies. | 11-19-2009 |
20110003813 | SUBSTITUTED BIARYL PIPERAZINYL-PYRIDINE ANALOGUES - Substituted biaryl piperazinyl-pyridine analogues are provided, of the Formula: | 01-06-2011 |
20110281837 | 3-SUBSTITUTED-6-ARYL PYRIDINES - 3-substituted-6-aryl pyridines of Formula I are provided: | 11-17-2011 |
20120208829 | 2-PHENOXY PYRIMIDINONE ANALOGUES - 2-Phenoxy pyrimidinone analogues are provided, of the Formula: | 08-16-2012 |
20140275071 | SUBSTITUTED XANTHINES AND METHODS OF USE THEREOF - Compounds, compositions and methods are described for inhibiting the TRPC5 ion channel and disorders related to TRPC5. | 09-18-2014 |
20140275528 | SUBSTITUTED XANTHINES AND METHODS OF USE THEREOF - Compounds, compositions and methods are described for inhibiting the TRPC5 ion channel and disorders related to TRPC5. | 09-18-2014 |
Patent application number | Description | Published |
20090259551 | SYSTEM AND METHOD FOR INSERTING ADVERTISEMENTS FROM MULTIPLE AD SERVERS VIA A MASTER COMPONENT - A system and method for rendering content may include an ad insertion system and/or content provider that, responsive to a request for media content from a terminal, provides to the terminal the media content, a program module, and ad insertion instructions, the ad insertion instructions including at least one link to a respective ad content providing entity. The terminal may render the media content via a media content player running on the terminal. For each of a plurality of ad insertion points during the rendering of the media content, the terminal may execute the program module to access a link of the at least one link, and, responsive to receipt of response data that is returned in response to the link access, load a content fetching program referenced by the response data, the loaded content fetching program subsequently obtaining ad content for rendering at the terminal. | 10-15-2009 |
20090259552 | SYSTEM AND METHOD FOR PROVIDING ADVERTISEMENTS FROM MULTIPLE AD SERVERS USING A FAILOVER MECHANISM - A system and method for providing ad content may include a processor configured to, for rendering ad content during a rendering of a user-requested content: receive from a first provider a first link to a second provider; access the second provider via the first link; in response, obtain a program component from the second provider, the program component, when loaded, configured to access the second provider to obtain a portion of the ad content; and subsequently receive a second link from the first provider, and/or use a second link provided by the first provided, for obtaining additional ad content. The processor may receive a failover link together with the first link for use in case of a failure which may occur during an attempt to obtain ad content from the second provider. The failover link may link back to the first provider. | 10-15-2009 |
Patent application number | Description | Published |
20140115659 | System and Methods for Secure Utilization of Attestation in Policy-Based Decision Making for Mobile Device Management and Security - Policy-based client-server systems and methods for attestation in managing and scouring mobile computing devices. Attestation provides the means to make efficient, secure, and reproducible use of knowledge possessed by trust expert parties and authorities within the expression and enforcement of policies for controlling use of and access to, onboard software and hardware, network capabilities, and remote assets and services. Aspects of secure attestation of applications that use shared and dynamically loaded libraries are presented, a well as potential business models for attestation used in such a policy-based system. | 04-24-2014 |
20150334133 | HARDWARE IMPLEMENTATION METHODS AND SYSTEM FOR SECURE, POLICY-BASED ACCESS CONTROL FOR COMPUTING DEVICES - A system and method for hardware implementations of policy-based secure computing environments for Internet enabled devices. The present invention facilitates a secure computing environment for any Internet enabled device where policy rules can be described as hardware components that allow or deny access to resources on the device. A compiler produces a hardware description language (HDL) of the hardware components based on given policy rules for that component. The system may be partially or completely implemented in hardware to address inherent limitations of a software only solution. The invention provides greater flexibility to the overall system in terms of performance, security, and expressiveness of the policy rules that must be executed. | 11-19-2015 |
20150350254 | AUTONOMOUS AND ADAPTIVE METHODS AND SYSTEM FOR SECURE, POLICY-BASED CONTROL OF REMOTE AND LOCALLY CONTROLLED COMPUTING DEVICES - An autonomous and adaptive method and system for secure, policy-based control of remote and locally controlled computing devices. The invention uses a policy-based access control mechanism to achieve adaptive and dynamic behavior modification based on the context of the local operating environment of the computing device. The modification system assesses the desirability of actions or outcomes as determined by the policy rules and modifies them accordingly, thus altering the behavior of the computing device. The system can utilize a machine learning technique, pattern matching and heuristic evaluation. When applied to the control of robotic and autonomous devices, the system allows the robot to offload adjudication to a remote system and also facilitates cooperative behaviors between robots operating in dynamic environments. | 12-03-2015 |
20150358822 | Utilizations and Applications of Near Field Communications in Mobile Device Management and Security - Systems and methods for using Near Field Communications | 12-10-2015 |