Patent application number | Description | Published |
20100069400 | METHODS FOR TREATING INFLAMMATION AND RELATED CONDITIONS - A method for treating an inflammatory condition or immune disorder comprises administering to a subject having such a condition or disorder a therapeutically effective amount of at least one compound selected from irindalone, physiologically active enantiomers thereof, and pharmaceutically acceptable salts thereof. The invention further provides a method for elevating levels of anti-inflammatory cytokines such as IL-10 and IL-13 while inhibiting expression of pro-inflammatory cytokines. A pharmaceutical composition, useful for example in topical treatment of psoriasis, comprises a therapeutically effective amount of at least one compound selected from irindalone, physiologically active enantiomers thereof, and pharmaceutically acceptable salts thereof, in a vehicle comprising at least one pharmaceutically acceptable excipient, the vehicle being adapted for topical administration to skin of a subject. | 03-18-2010 |
20100105746 | METHOD FOR TREATING METABOLIC DISEASES - A method for treating a condition of low metabolic rate, dyslipidemia, excess adiposity and/or insulin resistance, or a disease or syndrome characterized by one or more of said conditions in a subject, comprises administering to the subject a therapeutically effective amount of romazarit or a pharmaceutically acceptable salt, ester or prodrug thereof. | 04-29-2010 |
20120214821 | Lipidomic Biomarkers of Diabetes - The invention, in some aspects, relates to methods for predicting a subject's risk of developing a glucose-related metabolic disorder, e.g., diabetes. In some aspects, the invention relates to methods for selecting and monitoring a treatment for a glucose-related metabolic disorder, e.g., diabetes. | 08-23-2012 |
Patent application number | Description | Published |
20150046697 | OPERATOR ACTION AUTHENTICATION IN AN INDUSTRIAL CONTROL SYSTEM - Operator actions and/or other commands or requests are secured via an authentication path from an action originator to a communications/control module or any other industrial element/controller. In implementations, an industrial control system includes an action authenticator configured to sign an action request generated by the action originator. The destination communications/control module or any other industrial element/controller is configured to receive the signed action request, verify the authenticity of the signed action request, and perform a requested action when the authenticity of the signed action request is verified. | 02-12-2015 |
20150046701 | SECURE INDUSTRIAL CONTROL SYSTEM - A secure industrial control system is disclosed herein. The industrial control system includes a plurality of industrial elements (e.g., modules, cables) which are provisioned during manufacture with their own unique security credentials. A key management entity of the secure industrial control system monitors and manages the security credentials of the industrial elements starting from the time they are manufactured up to and during their implementation within the industrial control system for promoting security of the industrial control system. An authentication process, based upon the security credentials, for authenticating the industrial elements being implemented in the industrial control system is performed for promoting security of the industrial control system. In one or more implementations, all industrial elements of the secure industrial control system are provisioned with the security credentials for providing security at multiple (e.g., all) levels of the system. | 02-12-2015 |
20150046710 | Industrial control system redundant communications/control modules authentication - A set of redundant industrial control system communications/control modules includes at least a first communications/control module and a second communications/control module. The first and second communications/control modules are configured to perform an authentication sequence including: transmitting a request datagram from the first communications/control module to the second communications/control module, the request datagram including a first nonce, a first device authentication key certificate, and a first identity attribute certificate; transmitting a response datagram from the second communications/control module to the first communications/control module, the response datagram including a second nonce, a first signature associated with the first and second nonces, a second device authentication key certificate, and a second identity attribute certificate; and transmitting an authentication datagram from the first communications/control module to the second communications/control module when the response datagram is valid, the authentication datagram including a second signature associated with the first and second nonces. | 02-12-2015 |