Patent application number | Description | Published |
20090018061 | Compositions and Methods for Treating Cardiac Conditions - Pharmaceutical polypeptide compositions promote the survival of cardiac cells, recruit cardiac cells to the cardiac area, stimulate the differentiation of cardiac cells, stimulate the proliferation of cardiac cells, and promote the activity of cardiac cells, thereby treating cardiac conditions. Methods of providing these compositions to the cardiac area include catheterization and direct injection. In preferred embodiments, the compositions comprise one of more of the following growth factors: EGF, hFGF, cardiotrophin-1, thrombin, PDGF-BB, amphiregulin, epiregulin, HB-EGF, TGFalpha, betacellulin, heregulin alpha, NRG-1-beta1-HRG-beta1, FGF 9. | 01-15-2009 |
Patent application number | Description | Published |
20100210829 | Compositions and Methods for Treating Diseases, Disorders, or Conditions Characterized by Myelin Degeneration, Myelin Deficiency or Loss - Provided herein are novel polypeptides, polynucleotides and compositions containing such, and to methods useful in treating diseases, disorders, or conditions of the central nervous system (CNS) associated with demyelination. The novel polypeptides, polynucleotides stimulate oligodendrocyte precursor cell (OPC), and are capable of promoting myelination or remyelination in a subject. | 08-19-2010 |
20110319324 | METHODS OF AND COMPOSITIONS FOR STIMULATION OF GLUCOSE UPTAKE INTO MUSCLE CELLS AND TREATMENT OF DISEASES - The present invention relates to therapeutic uses of ErbB ligands, including betacellulin. The therapeutic uses include methods of using ErbB ligand family compounds alone, or in conjunction with other agents, for reducing blood glucose levels, treating Type I and Type II diabetes, obesity, muscle wasting diseases, and cardiotoxicity. | 12-29-2011 |
Patent application number | Description | Published |
20090081242 | METHODS OF THERAPY FOR B-CELL MALIGNANCIES USING ANTAGONIST ANTI-CD40 ANTIBODIES - Methods of therapy for B-cell malignancies are provided. The methods comprise administering a therapeutically effective amount of an antagonist anti-CD40 antibody or antigen-binding fragment thereof to a patient in need thereof. The antagonist anti-CD40 antibody or antigen-binding fragment thereof is free of significant agonist activity when the antibody binds a CD40 antigen on a normal human B cell, exhibits antagonist activity when the antibody binds a CD40 antigen on a malignant human B cell, and can exhibit antagonist activity when the antibody binds a CD40 antigen on a normal human B cell. Antagonist activity of the anti-CD40 antibody or antigen-binding fragment thereof beneficially inhibits proliferation and/or differentiation of malignant human B cells. | 03-26-2009 |
20100172869 | METHOD FOR TREATING MULTIPLE SCLEROSIS - Methods for treating multiple sclerosis (MS) and clinically isolated syndromes suggestive of MS are provided. The methods comprise administering a therapeutically effective dose of interferon-beta (IFN-beta) to a subject in need thereof, where the dose is administered intramuscularly with a dosing frequency of two- to three-times per week. | 07-08-2010 |
20100172912 | METHODS OF THERAPY FOR B-CELL MALIGNANCIES USING ANTAGONIST ANTI-CD40 ANTIBODIES - Methods of therapy for B-cell malignancies are provided. The methods comprise administering a therapeutically effective amount of an antagonist anti-CD40 antibody or antigen-binding fragment thereof to a patient in need thereof. The antagonist anti-CD40 antibody or antigen-binding fragment thereof is free of significant agonist activity when the antibody binds a CD40 antigen on a normal human B cell, exhibits antagonist activity when the antibody binds a CD40 antigen on a malignant human B cell, and can exhibit antagonist activity when the antibody binds a CD40 antigen on a normal human B cell. Antagonist activity of the anti-CD40 antibody or antigen-binding fragment thereof beneficially inhibits proliferation and/or differentiation of malignant human B cells. | 07-08-2010 |
20110033456 | METHODS OF THERAPY FOR B-CELL MALIGNANCIES USING ANTAGONIST ANTI-CD40 ANTIBODIES - Methods of therapy for B-cell malignancies are provided. The methods comprise administering a therapeutically effective amount of an antagonist anti-CD40 antibody or antigen-binding fragment thereof to a patient in need thereof. The antagonist anti-CD40 antibody or antigen-binding fragment thereof is free of significant agonist activity when the antibody binds a CD40 antigen on a normal human B cell, exhibits antagonist activity when the antibody binds a CD40 antigen on a malignant human B cell, and can exhibit antagonist activity when the antibody binds a CD40 antigen on a normal human B cell. Antagonist activity of the anti-CD40 antibody or antigen-binding fragment thereof beneficially inhibits proliferation and/or differentiation of malignant human B cells. | 02-10-2011 |
Patent application number | Description | Published |
20090172781 | TRUSTED VIRTUAL MACHINE AS A CLIENT - The embodiments provide generating a dedicated virtual machine image (DVMI) including functionality for a target service provider and launching the DVMI in the host device as a dedicated virtual machine (DVM). A measurement of the DVMI and/or the launched DVM, as a Trusted Dedicated Virtual Machine (TDVM), is transmitted to the target service provider server. The target service provider determines a trust level for the TDVM, based upon the measurement and provides a level of service by the target service provider server to the TDVM, according to the trust level of the TDVM. | 07-02-2009 |
20090235068 | Method and Apparatus for Identity Verification - A method for identity verification includes receiving a request for proof of identity from a service provider and receiving biometric information associated with a user of a communication device. The method also includes determining that the received biometric information matches a biometric profile that contains biometric information associated with a registered user of the communication device. The method also includes unlocking a private key associated with the registered user in response to determining that the received biometric information matches a biometric profile and sending a request for a digital certificate that is signed with the private key associated with the registered user. The method further includes receiving the digital certificate that includes a public key associated with the registered user and satisfies the request for proof of identity. The method also includes with forwarding the digital certificate to the service provider. | 09-17-2009 |
20110072502 | Method and Apparatus for Identity Verification - A method for identity verification includes receiving a request for proof of identity from a service provider and receiving biometric information associated with a user of a communication device. The method also includes determining that the received biometric information matches a biometric profile that contains biometric information associated with a registered user of the communication device. The method also includes unlocking a private key associated with the registered user in response to determining that the received biometric information matches a biometric profile and sending a request for a digital certificate that is signed with the private key associated with the registered user. The method further includes receiving the digital certificate that includes a public key associated with the registered user and satisfies the request for proof of identity. The method also includes with forwarding the digital certificate to the service provider. | 03-24-2011 |
20110126008 | Method and Apparatus for Sharing Documents - A method for securely sharing electronic documents on a document storage system. The method includes receiving an electronic document from a creating user, generating an encryption key unique to the electronic document, encrypting the electronic document using the encryption key to create an encrypted electronic document, and communicating the encrypted electronic document to a document repository for storage/ The method also includes identifying a resource locator for uniquely identifying the storage location of the encrypted electronic document and communicating the encryption key and the resource locator to the creating user. The method also includes receiving the encryption key and the resource locator from a requesting user, retrieving the encrypted electronic document from the document repository using the resource locator, decrypting the encrypted electronic document using the encryption key, and communicating the decrypted electronic document to the requesting user. | 05-26-2011 |
20110238837 | Method and System for Providing Services - Methods and systems for providing services and/or computing resources are provided. A method may include receiving an application from an application provider. The method may further include receiving data from a data provider. The method may also include receiving a first request from the data provider to execute the application and apply the data as input to the application. Additionally, the method may include executing the application in response to receiving the first request. The method may also include storing output data resulting from execution of the application. The method may further include receiving a second request from the data provider to transmit the output data to the data provider. The method may additionally include communicating the output data to the data provider in response to the second request. | 09-29-2011 |
20110314549 | METHOD AND APPARATUS FOR PERIODIC CONTEXT-AWARE AUTHENTICATION - A method for authenticating access to an electronic document. The method includes identifying a context event associated with a user seeking access to the electronic document, receiving from the user a plurality of context data, and analyzing the plurality of context data to generate a one or more derived context data. The method may also include receiving from an authentication module a context request, and in response to the context request, generating a context report, wherein the context report includes at least the one or more derived context data, and is configured to enable the authentication module to authenticate the user's access to the electronic document using a first authentication mechanism. The method may also include communicating the context report to the authentication module, monitoring the user to identify an occurrence of the context event, and upon identifying the occurrence of the context event, generating a context event flag, the context event flag configured to inform the authentication module to reauthenticate the user's access to the electronic document. | 12-22-2011 |
Patent application number | Description | Published |
20120047550 | Method and System for Device Integrity Authentication - A networked device performs integrity authentication by determining, using a processor, a measured integrity value of the device. The measured integrity value is compared by the processor to an embedded integrity value of the device. Application of a policy to the device is facilitated by the processor based on the comparison. | 02-23-2012 |
20120047557 | Method and System for Device Integrity Authentication - Device integrity authentication is performed by receiving, at a second device, a measured integrity value from a first device. The measured integrity value of the first device is compared at the second device to an embedded integrity value associated with the second device. A level of trust for the first device is determined by the second device based on the comparison. Application of a policy to the first device is facilitated by the second device based on the comparison. | 02-23-2012 |
20120047578 | Method and System for Device Integrity Authentication - Device integrity authentication is performed by receiving, at a second device, data from a first device. A determination is made at the second device as to whether at least a portion of the data is associated with a protected datatype. A measured integrity value of the first device is determined in response to the portion of the data being associated with the protected datatype. The measured integrity value of the first device is compared to an embedded integrity value associated with the second device. Application of at least one of a plurality of policies associated with processing the data is facilitated at the second device based on the comparison and the protected datatype. | 02-23-2012 |
20120260113 | Changing Device Behavior Based on External Information - A first electronic device comprises an information-filtering module configured to identify one or more second electronic devices that supply one or more types of information needed by the first electronic device; an information-gathering module coupled to the information-filtering module configured to collect information from the second electronic devices; and an operation module coupled to the information-gathering module configured to adjust operational behavior of the first electronic device based on the collected information. | 10-11-2012 |
20120316687 | System and Method for Managing Power Consumption - In accordance with a particular embodiment, a method for managing power consumption includes receiving power rate information and receiving power usage information. The method also includes receiving a plurality of personal preference profiles. Each personal preference profile of the plurality of personal preference profiles is associated with a different user of a plurality of users and includes at least one preferred state associated with a respective user. The method further includes detecting a presence of at least one user within a room. The method additionally includes adjusting at least one state associated with the room based on the at least one preferred state associated with the at least one user within the room, the power rate information, and the power usage information. | 12-13-2012 |
20120316695 | System and Method for Managing Power Consumption - In accordance with particular embodiments, a method for managing power consumption includes receiving from a plurality of electricity relays an indication of a current state associated with each of the plurality of electricity relays. The method also includes receiving a power rate associated with a cost of power. The method further includes determining a threshold state based on the power rate and the current state associated with each of the plurality of electricity relays. The method additionally includes transmitting one or more control requests to one or more of the plurality of electricity relays. A first control request transmitted to a first electricity relay is based on the threshold state and a first current state associated with the first electricity relay. | 12-13-2012 |
20130191643 | ESTABLISHING A CHAIN OF TRUST WITHIN A VIRTUAL MACHINE - According to an aspect of an embodiment, a method of establishing a chain of trust into a virtual machine on a hardware system is described. The method may include measuring an immutable portion of a virtual machine image configured to instantiate as the virtual machine to generate a trust anchor measurement. The method may also include storing the trust anchor measurement in a sealed memory. | 07-25-2013 |