Patent application number | Description | Published |
20090143462 | Products of Tetrahydrocannabinol, Compositions Comprising Prodrugs of Tetrahydrocannabinol and Methods of Using the Same - Described herein are Δ | 06-04-2009 |
20110052694 | USE OF CANNABIDIOL PRODRUGS IN TOPICAL AND TRANSDERMAL ADMINISTRATION WITH MICRONEEDLES - Described herein are microneedle drug delivery systems comprising a pharmaceutical compositions comprising pharmaceutically active agents (e.g., cannabidiol and prodrugs of cannabidiol) and microneedle arrays suitable for local and systemic delivery of the active agent to a mammal. Also described herein are methods of using a microneedle transdermal or topical drug delivery systems comprising pharmaceutical compositions, comprising cannabidiol and prodrugs of cannabidiol, and microneedle arrays in the treatment disease, including pancreatitis and pancreatic cancer. | 03-03-2011 |
20120289484 | PRODRUGS OF TETRAHYDROCANNABINOL, COMPOSITIONS COMPRISING PRODRUGS OF TETRAHYDROCANNABINOL AND METHODS OF USING THE SAME - Described herein are Δ | 11-15-2012 |
20150197484 | USE OF CANNABIDIOL PRODRUGS IN TOPICAL AND TRANSDERMAL ADMINISTRATION WITH MICRONEEDLES - Described herein are microneedle drug delivery systems comprising a pharmaceutical compositions comprising pharmaceutically active agents (e.g., cannabidiol and prodrugs of cannabidiol) and microneedle arrays suitable for local and systemic delivery of the active agent to a mammal. Also described herein are methods of using a microneedle transdermal or topical drug delivery systems comprising pharmaceutical compositions, comprising cannabidiol and prodrugs of cannabidiol, and microneedle arrays in the treatment disease, including pancreatitis and pancreatic cancer. | 07-16-2015 |
20150218121 | PRODRUGS OF TETRAHYDROCANNABINOL, COMPOSITIONS COMPRISING PRODRUGS OF TETRAHYDROCANNABINOL AND METHODS OF USING THE SAME - Described herein are Δ | 08-06-2015 |
Patent application number | Description | Published |
20090077644 | APPARATUS AND METHOD FOR INTEGRATING AUTHENTICATION PROTOCOLS IN THE ESTABLISHMENT OF CONNECTIONS BETWEEN COMPUTING DEVICES - An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm. | 03-19-2009 |
20100169979 | System and Method for Handling Restoration Operations on Mobile Devices - Systems and methods for handling restoration operations for a mobile device. A mobile device receives a kill pill command, wherein the command causes some or all data on the mobile device to be wiped. An indicator is stored to indicate that the kill pill command was sent to the mobile device. The indicator is used to determine whether a program should be wiped from the mobile device. | 07-01-2010 |
20110058568 | PACKET-BASED COMMUNICATION SYSTEM AND METHOD - A system and method for facilitating communication of packets between one or more applications residing on a first computing device and at least one second computing device. The system comprises a connection manager adapted to receive packets from the at least one second computing device, and a packet cache for storing packets received by the connection manager. The connection manager, upon receiving a packet from a second computing device, transmits the packet to the packet cache for storage and notifies each of the applications of receipt of the packet. Subsequently, the packet is retrievable from the packet cache by a notified application, and verification that the packet is intended for communication to the notified application is made. | 03-10-2011 |
20110167484 | APPARATUS AND METHOD FOR INTEGRATING AUTHENTICATION PROTOCOLS IN THE ESTABLISHMENT OF CONNECTIONS BETWEEN COMPUTING DEVICES - An apparatus and method for integrating authentication protocols in the establishment of connections between a controlled-access first computing device and at least one second computing device. In one embodiment, network access user authentication data needed to access the at least one second computing device is transmitted to an authentication server automatically if the user has access to use the first computing device, thereby not requiring the user to manually enter the authentication data needed for such access at the first computing device. The network access user authentication data may be, for example, retrieved from a memory store of the first computing device and/or generated in accordance with an authentication data generating algorithm. | 07-07-2011 |
20120191978 | SYSTEM AND METHOD FOR SECURING DATA FOR REDIRECTING AND TRANSPORTING OVER A WIRELESS NETWORK - A system and method for securing data for redirecting and transporting over a wireless network are generally described herein. In accordance with some embodiments, when it is determined that an electronic message that is protected with a first encryption algorithm is to be transported over a wireless network to a wireless device, the electronic message is converted to a data structure that is recognizable by the wireless device and the data structure is encrypted with a second encryption algorithm using a random session key. The second encryption algorithm has a stronger security than the first encryption algorithm. The random session key is encrypted with a public key and packets that comprise the encrypted data structure and the encrypted random session key are transmitted to the wireless device over the wireless network. | 07-26-2012 |
Patent application number | Description | Published |
20110191845 | WIRELESS COMMUNICATION DEVICE WITH DURESS PASSWORD PROTECTION AND RELATED METHOD - A wireless communication device (and its related method of operation) includes, if invoked, password protected access to data stored therewithin and/or to normal device operations and further includes duress password checking logic that automatically causes a duress message to be sent if a duress password has been entered. The duress message is preferably sent without maintaining any user accessible indication of such sending. It is also preferred that the password checking logic automatically cause an end-of-duress message to be sent if a normal password is entered after a duress password has been entered. A plurality of different duress passwords may be entered into a duress password portion of data memory in the device. | 08-04-2011 |
20110199977 | PACKET-BASED COMMUNICATION SYSTEM AND METHOD - A system and method for facilitating communication of packets between one or more applications residing on a first computing device and at least one second computing device. The system comprises a connection manager adapted to receive packets from the at least one second computing device, and a packet cache for storing packets received by the connection manager. The connection manager, upon receiving a packet from a second computing device, transmits the packet to the packet cache for storage and notifies each of the applications of receipt of the packet. Subsequently, the packet is retrievable from the packet cache by a notified application, and verification that the packet is intended for communication to the notified application is made. | 08-18-2011 |
20130007770 | PACKET-BASED COMMUNICATION SYSTEM AND METHOD - A system and method for facilitating communication of packets between one or more applications residing on a first computing device and at least one second computing device. The system comprises a connection manager adapted to receive packets from the at least one second computing device, and a packet cache for storing packets received by the connection manager. The connection manager, upon receiving a packet from a second computing device, transmits the packet to the packet cache for storage and notifies each of the applications of receipt of the packet. Subsequently, the packet is retrievable from the packet cache by a notified application, and verification that the packet is intended for communication to the notified application is made. | 01-03-2013 |