Patent application number | Description | Published |
20090292482 | Methods and Systems for Generating Cell Lineage Tree of Multiple Cell Samples - A method of generating a cell lineage tree of a plurality of cells of an individual is provided. The method comprising: (a) determining at least one genotypic marker for each cell of the plurality of cells; and (b) computationally clustering data representing the at least one genotypic marker to thereby generate the cell lineage tree of the plurality of cells of the individual. | 11-26-2009 |
20100240538 | Programmable iterated elongation: a method for manufacturing synthetic genes and combinatorial dna and protein libraries - A method for manufacturing synthetic genes and combinatorial DNA and protein libraries, termed here Divide and Conquer-DNA synthesis (D&C-DNA synthesis) method. The method can be used in a systematic and automated way to synthesize any long DNA molecule and, more generally, any combinatorial molecular library having the mathematical property of being a regular set of strings. The D&C-DNA synthesis method is an algorithm design paradigm that works by recursively breaking down a problem into two or more sub-problems of the same type. The division of long DNA sequences is done in silico. The assembly of the sequence is done in vitro. The D&C-DNA synthesis method protocol consists of a tree, in which each node represents an intermediate sequence. The internal nodes are created in elongation reactions from their daughter nodes, and the leaves are synthesized directly. After each elongation only one DNA strand passes to the next level in the tree until receiving the final product. Optionally and preferably, error correction is performed to correct any errors which may have occurred during the synthetic process. | 09-23-2010 |
20100311598 | SYSTEM AND METHOD FOR EDITING AND MANIPULATING DNA - A system and method for planning, manipulating, processing and editing DNA molecules utilizing a core operation on a given input DNA molecule to produce a targeted DNA molecule. | 12-09-2010 |
20120171680 | SINGLE-MOLECULE PCR FOR AMPLIFICATION FROM A SINGLE NUCLEOTIDE STRAND - A method, apparatus and system for performing single molecule PCR for amplification from single stranded polynucleotides. | 07-05-2012 |
20130130311 | METHODS AND SYSTEMS FOR ASSESSING CLONALITY OF CELL CULTURES - Methods of determining clonality of a cell culture are provided. Also provided are systems employing the above methods in high throughput sample screening. | 05-23-2013 |
20140066490 | SYSTEM AND METHOD FOR MODIFYING DEOXYRIBOZYMES - A system and method for programming DNAzymes to be utilized as programmable drugs, which are active only in the presence of specific input combinations and/or certain conditions. | 03-06-2014 |
20150211041 | PROGRAMMABLE NOR-BASED DEVICE FOR TRANSCRIPTION PROFILE ANALYSES - An autonomous synthetic programmable device adapted to determine a cell state according to one or more different predefined markers, comprising a transcription machinery and a regulatory element for regulating said transcription machinery, said regulatory element comprising at least three different binding regions, each binding region binding a different transcription factor and each binding region corresponding to a different predefined marker, wherein the regulatory element permits said transcription machinery to provide a transcription output if and only if all three different transcription factors are absent and wherein each transcription factor is capable of blocking transcription by said transcription machinery and hence blocking said transcription output. | 07-30-2015 |
20150252362 | PROGRAMMABLE ITERATED ELONGATION: A METHOD FOR MANUFACTURING SYNTHETIC GENES AND COMBINATORIAL DNA AND PROTEIN LIBRARIES - A method for manufacturing synthetic genes and combinatorial DNA and protein libraries, termed here Divide and Conquer-DNA synthesis (D&C-DNA synthesis) method. The method can be used in a systematic and automated way to synthesize any long DNA molecule and, more generally, any combinatorial molecular library having the mathematical property of being a regular set of strings. The D&C-DNA synthesis method is an algorithm design paradigm that works by recursively breaking down a problem into two or more sub-problems of the same type. The division of long DNA sequences is done in silico. The assembly of the sequence is done in vitro. The D&C-DNA synthesis method protocol consists of a tree, in which each node represents an intermediate sequence. The internal nodes are created in elongation reactions from their daughter nodes, and the leaves are synthesized directly. After each elongation only one DNA strand passes to the next level in the tree until receiving the final product. Optionally and preferably, error correction is performed to correct any errors which may have occurred during the synthetic process. | 09-10-2015 |
Patent application number | Description | Published |
20100016443 | METHOD FOR PREPARING PARTICLES COMPRISING METAL OXIDE COATING AND PARTICLES WITH METAL OXIDE COATING - The invention relates to a process for coating a solid, water-insoluble particulate matter, with a metal oxide comprising: (a) contacting the solid, water-insoluble particulate matter with an ionic additive and an aqueous medium to obtain a dispersion of said particulate matter having positive charges on its surface; (b) subjecting the particulate matter to a coating procedure comprising precipitating a metal oxide salt onto the surface of the particulate matter to form a metal oxide layer thereon to thereby obtain particulate matter coated by a metal oxide coating layer; (c) repeating step (b) at least 4 more times; and (d) aging said coating layer. The invention further relates to particles comprising a particulate matter coated by a metal oxide layer, to a use of the particles for topical administration, and to a method for preventing, reducing, or eliminating pests at a locus, using the particles. | 01-21-2010 |
20100047357 | COMPOSITIONS FOR TOPICAL APPLICATION COMPRISING A PEROXIDE AND RETINOID - The invention relates to a composition for topical application comprising as an active ingredient a peroxide and a retinoid wherein one of said peroxide and retinoid is in the form of first microparticles comprising a solid particulate matter of the active ingredient coated by a metal oxide layer and the other of said peroxide and retinoid is present in an uncoated free form or in a coated form of the active ingredient. The invention further relates to method for treating a surface condition in a subject using said composition, a method for preparing a composition exhibiting improved stability, and a kit comprising: (a) a first composition comprising a peroxide as a first active ingredient; and (b) a second composition comprising a retinoid as a second active ingredient; at least one of said first and said second active ingredient being coated by a metal oxide layer. | 02-25-2010 |
20100203121 | FORMATION OF NANOMETRIC CORE-SHELL PARTICLES HAVING A METAL OXIDE SHELL - A process for preparing nanocapsules having a core-shell structure, comprising: | 08-12-2010 |
20120269874 | COMPOSITIONS FOR TOPICAL APPLICATION COMPRISING A PEROXIDE AND RETINOID - The invention relates to a composition for topical application comprising as an active ingredient a peroxide and a retinoid wherein one of said peroxide and retinoid is in the form of first microparticles comprising a solid particulate matter of the active ingredient coated by a metal oxide layer and the other of said peroxide and retinoid is present in an uncoated free form or in a coated form of the active ingredient. The invention further relates to method for treating a surface condition in a subject using said composition, a method for preparing a composition exhibiting improved stability, and a kit comprising: (a) a first composition comprising a peroxide as a first active ingredient; and (b) a second composition comprising a retinoid as a second active ingredient; at least one of said first and said second active ingredient being coated by a metal oxide layer. | 10-25-2012 |
Patent application number | Description | Published |
20120304304 | MINIMIZING SENSITIVE DATA EXPOSURE DURING PREPARATION OF REDACTED DOCUMENTS - A document review and security technique is provided that presents a first portion of a document to a first reviewer, wherein the first portion includes less than the entire document, presents a second portion of the document to a second reviewer, wherein the second portion includes less than the entire document, wherein the second portion is at least partially different from the first portion, and wherein the first reviewer and the second reviewer are different reviewers, receives from the first reviewer a review action input associated with the first portion, receives from the second reviewer a review action input associated with the second portion, and determines a disposition of the document in accordance with the review action inputs. | 11-29-2012 |
20130004075 | MINIMIZING SENSITIVE DATA EXPOSURE DURING PREPARATION OF REDACTED DOCUMENTS - A document review and security technique is provided that presents a first portion of a document to a first reviewer, wherein the first portion includes less than the entire document, presents a second portion of the document to a second reviewer, wherein the second portion includes less than the entire document, wherein the second portion is at least partially different from the first portion, and wherein the first reviewer and the second reviewer are different reviewers, receives from the first reviewer a review action input associated with the first portion, receives from the second reviewer a review action input associated with the second portion, and determines a disposition of the document in accordance with the review action inputs. | 01-03-2013 |
20150220758 | MINIMIZING SENSITIVE DATA EXPOSURE DURING PREPARATION OF REDACTED DOCUMENTS - A document review and security technique is provided that presents a first portion of a document to a first reviewer, wherein the first portion includes less than the entire document, presents a second portion of the document to a second reviewer, wherein the second portion includes less than the entire document, wherein the second portion is at least partially different from the first portion, and wherein the first reviewer and the second reviewer are different reviewers, receives from the first reviewer a review action input associated with the first portion, receives from the second reviewer a review action input associated with the second portion, and determines a disposition of the document in accordance with the review action inputs. | 08-06-2015 |
Patent application number | Description | Published |
20080205640 | Digital content delivery system and method - A system and a method for flexible, yet secure distribution of digital content items, optionally with an automatic payment mechanism for purchasing such content. The present invention supports the distribution of content to end user devices from a central distribution point, as in client-server models and variations thereof, and/or peer-to-peer distribution, for example between end user devices. In addition, the present invention also supports distribution models within either of these mechanisms for unitary distribution, to a specified end user device, or broadcast/multicast distribution, to a plurality of end user devices. In any case, in order for the distributed content to be operative, for example to be “played back” or otherwise displayed, the recipient end user device must be in communication with a network control center. The network control center then enables the recipient end user device to play back or otherwise display the received content, for example by sending a code to the recipient end user device. Optionally, the network control center may require payment to be received before enabling the content for the recipient end user device. Thus, the present invention supports flexible distribution of content according to a number of different distribution models, while still preventing unauthorized play back or other display throughout the lifecycle of the digital content item, and optionally enabling assured payments. | 08-28-2008 |
20120102575 | DIGITAL CONTENT DELIVERY SYSTEM AND METHOD - A method and system for securing digital content for transmission to an end user device. In a preferred embodiment, the invention provides for: a control center for controlling access to the digital content by the end user device; transmitting scrambled digital content to the end user device, such that the end user device cannot play back the said scrambled digital content; contacting the control center to request a PECM (personal ECM), the PECM being specific to the end user device; transmitting the PECM to the end user device by the control center; and unscrambling the scrambled digital content by the end user device according to the PECM. | 04-26-2012 |
Patent application number | Description | Published |
20110083194 | SECURITY WITHIN INTEGRATED CIRCUITS - A method for hindering detection of information unintentionally leaked from a secret held in a memory unit is described, the method including receiving a triggering event waiting for at least a first amount of time to pass after the receipt of the triggering event, the memory unit being in a non-operational state during the at least a first amount of time after the at least a first amount of time has passed, changing at least one first condition under which the memory unit operates, thereby causing the memory unit to enter an operational state, waiting for a second amount of time to pass after the changing at least one first condition, and changing, after the second amount of time, at least one second condition under which the memory unit operates, thereby causing the memory unit to enter the non-operational state, wherein access to the secret information is enabled only during the second amount of time, and detection of secret information unintentionally leaked is limited during the first amount of time. Related apparatus and methods are also described. | 04-07-2011 |
20130291130 | Protection of Memory Field Using Illegal Values - An electronic device ( | 10-31-2013 |
20130305372 | Preventing Unauthorized Data Extraction - An electronic device ( | 11-14-2013 |
20130326632 | Security Within Integrated Circuits - A method for hindering detection of information unintentionally leaked from a secret held in a memory unit is described, the method including receiving a triggering event waiting for at least a first amount of time to pass after the receipt of the triggering event, the memory unit being in a non-operational state during the at least a first amount of time after the at least a first amount of time has passed, changing at least one first condition under which the memory unit operates, thereby causing the memory unit to enter an operational state, waiting for a second amount of time to pass after the changing at least one first condition, and changing, after the second amount of time, at least one second condition under which the memory unit operates, thereby causing the memory unit to enter the non-operational state, wherein access to the secret information is enabled only during the second amount of time, and detection of secret information unintentionally leaked is limited during the first amount of time. Related apparatus and methods are also described. | 12-05-2013 |
20140009995 | Protection of Stored Data Using Optical Emitting Elements - An integrated circuit device ( | 01-09-2014 |
20140143883 | Preventing Data Extraction by Side-Channel Attack - A method for data transfer includes receiving a control signal triggering a transfer of a secret value into an element ( | 05-22-2014 |