Patent application number | Description | Published |
20090011056 | LINGONBERRY EXTRACT, METHODS OF PREPARING, AND USES THEREOF - A first extract of lingonberry ( | 01-08-2009 |
20100152286 | Method for Producing Fucoxanthin - The present invention provides a method for producing fucoxanthin extract, said method comprising: performing absorption of the fucoxanthin extract by using absorbent and then performing elution to remove heavy metals and arsenic salt contained in the fucoxanthin extract, wherein the absorbent is selected from a group having macroporous resin, polyamide, activated carbon, alumina and a combination thereof. The method for producing fucoxanthin extract according to the present invention, the content of heave metal in the fucoxanthin extract can be reduced, while the content of fucoxanthin in the fucoxanthin extract can increase. In addition, the present invention also provides a fucoxanthin extract obtained by the above method, as well as fucoxanthin products containing the fucoxanthin extract. | 06-17-2010 |
20100297272 | Cosmetic Composition Containing Lingonberry Extract and Its Uses - The invention relates to a cosmetic composition containing lingonberry extract and its use on skin cosmetology thereof. The present invention has provided a lingonberry extract wherein containing polyphenols components including anthocyanidin, procyanidin, resveratrol, catechin and so on. The present invention also relates to the application of lingonberry extract on skin cosmetology, including without limitation whitening, diminishing visible pigmentation, anti-wrinkle, moisturizing, smoothing and improving skin sensitivity. The invention also has revealed drugs, cosmetic composition and food prepared by using lingonberry extract. Comparing with the prior art cosmetic compositions, the said lingonberry extract of the present invention has higher effects and safe. | 11-25-2010 |
20110038985 | BLACK SOYBEAN HULL EXTRACT, METHOD FOR OBTAINING, AND USE THEREOF - Methods for preparing black soybean hull extracts and uses thereof. The methods can comprise: (1) extracting crushed black soybean hull with aqueous solution containing enzyme and filtering the extracted liquid; (2) ultrafiltration of the extract liquid with an ultrafiltration membrane; (3) absorbing the ultrafiltration liquid with an absorption resin or an ion exchange resin, and elution with ethanol to obtain purified extract liquid; (4) concentrating the purified extract liquid under vacuum; (5) spray drying the concentrated liquid. The extract can contain: | 02-17-2011 |
20110274716 | COMPOSITIONS CONTAINING FUCOXANTHIN EXTRACT - A composition comprises extract of fucoxanthin, wherein said composition further comprises tocotrienols and/or fucoidan. Said composition can be used to treat obesity. Said composition shows outstanding effect of weight loss. There is outstanding synergy effect among those constituents of the composition. | 11-10-2011 |
20120220580 | PREPARATION OF CAROTENOID DERIVATIVES AND THEIR APPLICATIONS - Compounds having the structure of general formula I or pharmaceutically acceptable salts thereof which are derivatives of fucoxanthin and fucoxanthol are disclosed. A preparation method of the compound and its use in weight reducing are also disclosed. | 08-30-2012 |
20130030046 | USE OF BLACK SOYBEAN HULL EXTRACTS IN MANUFACTURE OF PRODUCTS FOR PREVENTING AND TREATING OSTEOARTHRITIS - The application relates to a use of black soybean hull extracts in the manufacture of foods, health care products and medicaments. The black soybean hull extracts can be added to foods or drinks, and also can be made into all kinds of oral health care products and oral medicaments used by conventional methods of preparing traditional Chinese medicine preparations. The products can significantly improve symptoms of osteoarthritis, and also can stabilize or even reverse the degradation of cartilage of osteoarthritis. | 01-31-2013 |
20130189382 | Use of fucoxanthin in the preparation of product for improving memory and having neuroprotective effect associated with neurodegenerative disorder - Use of fucoxanthin in the preparation of a product having neuroprotective effect associated with neurodegenerative disorder and improving memory is disclosed in the disclosure. A product having neuroprotective effect associated with neurodegenerative disorder is also disclosed in the disclosure. Fucoxanthin can inhibit oxidative stress of cells and has the effect of preventing or treating Alzheimer's disease and improving memory. | 07-25-2013 |
20130224240 | METHOD OF REDUCING WEIGHT USING COMPOSITION CONTAINING FUCOXANTHIN EXTRACT - A method of reducing a weight of a subject includes administering to the subject in need thereof a composition comprised of fucoxanthin extract and at least one selected from the group consisting of tocotrienol, fucoidan and a combination thereof, wherein the subject is a mammal. | 08-29-2013 |
20130296418 | Cosmetic Composition Containing Lingonberry Extract And Its Uses - The invention relates to a cosmetic composition containing lingonberry extract and its use on skin cosmetology thereof. The present invention has provided a lingonberry extract wherein containing polyphenols components including anthocyanidin, procyanidin, resveratrol, catechin and so on. The present invention also relates to the application of lingonberry extract on skin cosmetology, including without limitation whitening, diminishing visible pigmentation, anti-wrinkle, moisturizing, smoothing and improving skin sensitivity. The invention also has revealed drugs, cosmetic compositions and food prepared by using lingonberry extract. Comparing with the prior art cosmetic compositions, the said lingonberry extract of the present invention has higher effects and safe. | 11-07-2013 |
Patent application number | Description | Published |
20090013184 | Method, System And Apparatus For Protecting A BSF Entity From Attack - A method, system and apparatus for protecting a bootstrapping service function (BSF) entity from attack includes: obtaining a first temporary identity and a second temporary identity after a user equipment (UE) performing mutual authentication with the BSF entity, where the first temporary identity is different from the second temporary identity; by the UE, originating a re-authentication request to the BSF entity through the first temporary identity; and originating a service request to a NAF entity through the second temporary identity. The present disclosure prevents attackers from intercepting the temporary identity at the Ua interface and using the temporary identity to originate a re-authentication request at the Ub interface, thus protecting the BSF entity from attack and avoiding unnecessary load on the BSF entity and saving resources. | 01-08-2009 |
20090116642 | METHOD AND DEVICE FOR GENERATING LOCAL INTERFACE KEY - A method for generating a local interface key includes: generating a variable parameter; and deriving the local interface key, according to the variable parameter generated and related parameters for calculating the local interface key. The method simplifies the process in which the terminal obtains the local interface key and the system resources are saved. Moreover, the local interface key is derived through the variable parameter and the valid key information. Thus, the security level between the UICC and the terminal is ensured. | 05-07-2009 |
20090117877 | METHOD AND DEVICE FOR REALIZING PUSH SERVICE OF GAA - The present invention discloses a method and a device for realizing PUSH service of GAA. The method includes the steps: the network side determines a PUSH service cryptographic key; the subscriber side communicates with the network side, and determines the PUSH service cryptographic key in accordance with the network side, and communicates with the network side using the PUSH service cryptographic key. By means of the method, the cryptographic key type of the PUSH service can be selected conveniently and agilely according to the actual application situation, and the network side and the subscriber side can select the derivation cryptographic key of the cryptographic key type meeting the requirement to communicate with each other. | 05-07-2009 |
20100202618 | Method and apparatus for updating key in an active state - A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state. | 08-12-2010 |
20110023094 | METHOD, APPARATUS, AND SYSTEM FOR PREVENTING ABUSE OF AUTHENTICATION VECTOR - A method for preventing abuse of an Authentication Vector (AV) and a system and apparatus for implementing the method are provided. Access network information of a non-3rd Generation Partnership Project (3GPP) access network where a user resides is bound to an AV of the user, so that when the user accesses an Evolved Packet System (EPS) through the non-3GPP access network, even if an entity in the non-3GPP access network is breached, or an Evolved Packet Data Gateway (ePDG) connected to an untrusted non-3GPP access network is breached, the stolen AV cannot be applied to other non-3GPP access networks by an attacker. | 01-27-2011 |
20110045832 | METHOD, SYSTEM AND DEVICE FOR MAINTAINING USER SERVICE CONTINUITY - A method, a system and a device for maintaining user service continuity are provided in an embodiment of the present invention. The method includes prohibiting a UE from accessing a forbidden network before handover is complete when the UE needs to perform network handover if the UE adopts a SIM access technology, thus avoiding service interruption of a SIM user due to access to an incorrect network. A system and a device for maintaining user service continuity are provided in an embodiment of the present invention. | 02-24-2011 |
20110080875 | METHOD AND APPARATUS FOR UPDATING A KEY IN AN ACTIVE STATE - A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state. | 04-07-2011 |
20120058766 | METHOD, SYSTEM AND DEVICE FOR MAINTAINING USER SERVICE CONTINUITY - A method, a system and a device for maintaining user service continuity are provided in an embodiment of the present invention. The method includes prohibiting a UE from accessing a forbidden network before handover is complete when the UE needs to perform network handover if the UE adopts a SIM access technology, thus avoiding service interruption of a SIM user due to access to an incorrect network. A system and a device for maintaining user service continuity are provided in an embodiment of the present invention. | 03-08-2012 |
Patent application number | Description | Published |
20110310849 | METHOD AND APPARATUS FOR UPDATING A KEY IN AN ACTIVE STATE - A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state. | 12-22-2011 |
20120246464 | METHOD, SYSTEM AND APPARATUS FOR PROTECTING A BSF ENTITY FROM ATTACK - A method, system and apparatus for protecting a bootstrapping service function (BSF) entity from attack includes: a first temporary identity and a second temporary identity are generated after a BSF entity performs a mutual authentication with a user equipment (UE) by using an initial temporary identity sent from the UE; the BSF entity receives a re-authentication request carrying the first temporary identity from the UE; and the UE sends a service request carrying the second temporary identity to a network application function (NAF) entity. The present disclosure prevents attackers from intercepting the temporary identity at the Ua interface and using the temporary identity to originate a re-authentication request at the Ub interface, thus protecting the BSF entity from attack and avoiding unnecessary load on the BSF entity and saving resources. | 09-27-2012 |
20120307803 | METHOD AND APPARATUS FOR UPDATING A KEY IN AN ACTIVE STATE - A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state. | 12-06-2012 |
20140007207 | METHOD AND DEVICE FOR GENERATING LOCAL INTERFACE KEY | 01-02-2014 |
20140018042 | METHOD, SYSTEM AND DEVICE FOR MAINTAINING USER SERVICE CONTINUITY - A method, a system and a device for maintaining user service continuity are provided in an embodiment of the present invention. The method includes prohibiting a UE from accessing a forbidden network before handover is complete when the UE needs to perform network handover if the UE adopts a SIM access technology, thus avoiding service interruption of a SIM user due to access to an incorrect network. A system and a device for maintaining user service continuity are provided in an embodiment of the present invention. | 01-16-2014 |
20140053249 | METHOD, APPARATUS, AND SYSTEM FOR PREVENTING ABUSE OF AUTHENTICATION VECTOR - A method for preventing abuse of an Authentication Vector (AV) and a system and apparatus for implementing the method are provided. Access network information of a non-3rd Generation Partnership Project (3GPP) access network where a user resides is bound to an AV of the user, so that when the user accesses an Evolved Packet System (EPS) through the non-3GPP access network, even if an entity in the non-3GPP access network is breached, or an Evolved Packet Data Gateway (ePDG) connected to an untrusted non-3GPP access network is breached, the stolen AV cannot be applied to other non-3GPP access networks by an attacker. | 02-20-2014 |
20140181930 | METHOD, SYSTEM AND APPARATUS FOR PROTECTING ABSF ENTITY FROM ATTACK - A method, system and apparatus for protecting a bootstrapping service function (BSF) entity from attack includes: a first temporary identity and a second temporary identity are generated after a BSF entity performs a mutual authentication with a user equipment (UE) by using an initial temporary identity sent from the UE; the BSF entity receives a re-authentication request carrying the first temporary identity from the UE; and the UE sends a service request carrying the second temporary identity to a network application function (NAF) entity. The present disclosure prevents attackers from intercepting the temporary identity at the Ua interface and using the temporary identity to originate a re-authentication request at the Ub interface, thus protecting the BSF entity from attack and avoiding unnecessary load on the BSF entity and saving resources. | 06-26-2014 |
20150208240 | METHOD AND APPARATUS FOR UPDATING A KEY IN AN ACTIVE STATE - A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state. | 07-23-2015 |