Patent application number | Description | Published |
20090111794 | Aryl-substituted bridged or fused diamines as modulators of leukotriene A4 hydrolase - Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A | 04-30-2009 |
20090258854 | Thiazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amines as modulators of leukotriene A4 hydrolase - Thiazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amine compounds are described, which are useful as LTA4 hydrolase (LTA4H) modulators. Such compounds may be used in pharmaceutical compositions and methods for modulation of LTA4H and for the treatment of disease states, disorders, and conditions mediated by LTA4 hydrolase activity. | 10-15-2009 |
20090325927 | Benzofuro- and benzothienopyrimidine modulators of the histamine H4 receptor - Benzofuro- and benzothienopyrimidine compounds are described, which are useful as H | 12-31-2009 |
20100274004 | BICYCLIC PIRAZOLE COMPOUNDS AS ANTIBACTERIAL AGENTS - Antibacterial compounds, compositions containing them, and methods of use for the inhibition of bacterial activity and the treatment, prevention or inhibition of bacterial infection. | 10-28-2010 |
20100274005 | BICYCLIC PYRAZOLE COMPOUNDS AS ANTIBACTERIAL AGENTS - Antibacterial compounds, compositions containing them, and methods of use for the inhibition of bacterial activity and the treatment, prevention or inhibition of bacterial infection. | 10-28-2010 |
20100280240 | BICYCLIC PYRAZOLE COMPOUNDS AS ANTIBACTERIAL AGENTS - Antibacterial compounds, compositions containing them, and methods of use for the inhibition of bacterial activity and the treatment, prevention or inhibition of bacterial infection. | 11-04-2010 |
20100292208 | COMPOUNDS WITH TWO FUSED BICYCLIC HETEROARYL MOIETIES AS MODULATORS OF LEUKOTRIENE A4 HYDROLASE - Compounds with two fused bicyclic heteroaryl moieties and their pharmaceutical compositions, and methods of using them as leukotriene A | 11-18-2010 |
20110159563 | Thyazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amines as modulators of leukotriene A4 hydrolase - Thiazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amine compounds are described, which are useful as LTA4 hydrolase (LTA4H) modulators. Such compounds may be used in pharmaceutical compositions and methods for modulation of LTA4H and for the treatment of disease states, disorders, and conditions mediated by LTA4 hydrolase activity. | 06-30-2011 |
20110190503 | Thiazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amines as modulators of leukotriene A4 hydrolase - Thiazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amine compounds are described, which are useful as LTA4 hydrolase (LTA4H) modulators. Such compounds may be used in pharmaceutical compositions and methods for modulation of LTA4H and for the treatment of disease states, disorders, and conditions mediated by LTA4 hydrolase activity. | 08-04-2011 |
20110257153 | Aryl-substituted bridged or fused diamines as modulators of leukotriene A4 hydrolase - Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A | 10-20-2011 |
20110263639 | Aryl-substituted bridged or fused diamines as modulators of leukotriene A4 hydrolase - Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A | 10-27-2011 |
20130338139 | THERAPEUTIC THIOPHENE-, FURAN-, AND PYRIDINE-FUSED AZOLOPYRIMIDIN-5-(6H)-ONES - Described herein are compounds of Formula I and Formula II, methods of their synthesis, compositions comprising the compounds, and use of the compounds and compositions in treating numerous diseases and disorders, including cognitive deficits associated with CNS diseases and disorders. | 12-19-2013 |
20150158885 | SUBSTITUTED PYRIDINE AZOLOPYRIMIDINE-5-(6H)-ONE COMPOUNDS - Described herein are compounds and chemical entities of Formula I, methods of their synthesis, compositions comprising them, and their use in treating numerous diseases and disorders, including cognitive deficits associated with CNS diseases and disorders. | 06-11-2015 |
20160031901 | SUBSTITUTED THIOPHENE- AND FURAN-FUSED AZOLOPYRIMIDINE-5-(6H)-ONE COMPOUNDS - Described herein are compounds and chemical entities of Formula (I), methods of their synthesis, compositions comprising them, and their use in treating numerous diseases and disorders, including cognitive deficits associated with CNS diseases and disorders. | 02-04-2016 |
20160075719 | THERAPEUTIC THIOPHENE-, FURAN-, AND PYRIDINE-FUSED AZOLOPYRIMIDIN-5-(6H)-ONES - Described herein are compounds of Formula I and Formula II, methods of their synthesis, compositions comprising the compounds, and use of the compounds and compositions in treating numerous diseases and disorders, including cognitive deficits associated with CNS diseases and disorders. | 03-17-2016 |
Patent application number | Description | Published |
20080263625 | METHOD AND SYSTEM FOR ACCESS CONTROL USING RESOURCE FILTERS - The present description refers in particular to a method, a system, and a computer program product for access control using resource filters for a strict separation of application and security logic. The computer-implemented method for access control may include receiving at least one access request to at least one resource from an application; providing a resource hierarchy for the at least one resource, the resource having at least one resource class, wherein the resource hierarchy is defined in a single resource; providing a policy comprising at least one access control rule for accessing at least one element of the at least one resource class; verifying the at least one access request based on the policy through an authorization service; and processing the at least one access request through a service interface. | 10-23-2008 |
20090049517 | METHOD AND SYSTEM FOR PERFORMING AN UNTRACEABLE SECRET MATCHING - Performing an untraceable secret matching between a first credential associated with a first property of a first user and a second credential associated with a second property of a second user includes receiving the first credential, receiving a matching reference formed so the first user can detect a matching of the first property with a remote property from a credential of another user, supplying a first nonce value to the second user, receiving a hidden version of the second credential from the second user formed by the second user on the basis of the second credential, the first nonce value supplied by the first user and a random value locally generated on a side of the second user, and performing the matching by combining the first credential and the received hidden credential with the first nonce value and comparing the combination with the matching reference. | 02-19-2009 |
20090077376 | Method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system - There are provided a method, a system and an initiator server for a secure execution of workflow tasks of a workflow to be executed according to a given execution pattern in a distributed workflow management system within a decentralized network system with a plurality of servers (b | 03-19-2009 |
20120167225 | PASSWORD PROTECTION USING PERSONAL INFORMATION - Provided personal information from a user may be determined, the provided personal information being associated with network publication thereof. A comparison of the provided personal information with password-related information may be performed. Based on the comparison, it may be determined that a risk level associated with the network publication relative to password security of at least one password associated with the password-related information exceeds a predetermined risk level. The user may be notified that the network publication of the provided personal information is associated with potential compromise of the password security of the at least one password. | 06-28-2012 |
20140074668 | Sensor-based Risk Assessment in Supply Chain Processes - In one embodiment, a method includes determining a set of constraints based on a supply chain activity and a classification. The method then configures a set of sensor nodes based on the set of constraints. The set of sensor nodes is associated with an asset being monitored. A notification is received from a sensor node when one of the set of constraints is violated by a current context detected by the sensor node for the asset. The set of sensor nodes uses the set of constraints to evaluate the set of constraints against current contexts detected in the supply chain activity in real-time. The method then sends an alert to a supply chain management system based on the notification, the alert indicating the violation of the constraint associated with the asset. | 03-13-2014 |