Patent application number | Description | Published |
20140219956 | PRO-DRUG FORM (P2PDOX) OF THE HIGHLY POTENT 2-PYRROLINODOXORUBICIN CONJUGATED TO ANTIBODIES FOR TARGETED THERAPY OF CANCER - Disclosed are methods, compositions and uses of conjugates of prodrug forms of 2-pyrrolinodoxorubicin (P2PDox) with antibodies or antigen-binding fragments thereof (ADCs), with targetable construct peptides or with other targeting molecules that are capable of delivering the P2PDox to a targeted cell, tissue or pathogen. Once delivered to the target cell, the ADC or peptide conjugate is internalized, a highly toxic 2-pyrrolinodoxorubicin (2-PDox) is released intracellularly. The P2PDox-peptide or ADC conjugates are of use to treat a wide variety of diseases, such as cancer, autoimmune disease or infectious disease. | 08-07-2014 |
20150018516 | PRO-DRUG FORM (P2PDOX) OF THE HIGHLY POTENT 2-PYRROLINODOXORUBICIN CONJUGATED TO ANTIBODIES FOR TARGETED THERAPY OF CANCER - Disclosed are methods, compositions and uses of conjugates of prodrug forms of 2-pyrrolinodoxorubicin (P2PDox) with antibodies or antigen-binding fragments thereof (ADCs), with targetable construct peptides or with other targeting molecules that are capable of delivering the P2PDox to a targeted cell, tissue or pathogen. Once delivered to the target cell, the ADC or peptide conjugate is internalized, a highly toxic 2-pyrrolinodoxorubicin (2-PDox) is released intracellularly. The P2PDox-peptide or ADC conjugates are of use to treat a wide variety of diseases, such as cancer, autoimmune disease or infectious disease. | 01-15-2015 |
20150283264 | PRO-DRUG FORM (P2PDOX) OF THE HIGHLY POTENT 2-PYRROLINODOXORUBICIN CONJUGATED TO ANTIBODIES FOR TARGETED THERAPY OF CANCER - Disclosed are methods, compositions and uses of conjugates of prodrug forms of 2-pyrrolinodoxorubicin (P2PDox) with antibodies or antigen-binding fragments thereof (ADCs), with targetable construct peptides or with other targeting molecules that are capable of delivering the P2PDox to a targeted cell, tissue or pathogen. Once delivered to the target cell, the ADC or peptide conjugate is internalized, a highly toxic 2-pyrrolinodoxorubicin (2-PDox) is released intracellularly. The P2PDox-peptide or ADC conjugates are of use to treat a wide variety of diseases, such as cancer, autoimmune disease or infectious disease. | 10-08-2015 |
Patent application number | Description | Published |
20130086658 | PRIVILEGED ACCOUNT MANAGER, ACCESS MANAGEMENT - Techniques for managing accounts are provided. An access management system may check out credentials for accessing target systems. For example a user may receive a password for a period of time or until checked back in. Access to the target system may be logged during this time. Upon the password being checked in, a security account may modify the password so that the user may not log back in without checking out a new password. Additionally, in some examples, password policies for the security account may be managed. As such, when a password policy changes, the security account password may be dynamically updated. Additionally, in some examples, hierarchical viewing perspectives may be determined and/or selected for visualizing one or more managed accounts. Further, accounts may be organized into groups based on roles, and grants for the accounts may be dynamically updated as changes occur or new accounts are managed. | 04-04-2013 |
20150082372 | PRIVILEGED ACCOUNT PLUG-IN FRAMEWORK - STEP-UP VALIDATION - Techniques for managing privileged accounts via a privileged access management service are provided. In some examples, the service may be configured with a plug-in framework for accessing secure resources. In some aspects, plug-in code for implementing a workflow that includes step-up validation associated with a user attempting to access at least one secure resource may be received. Access to the at least one secure resource may be provided when the user is authenticated with respect to the service. In some examples, a request to access a second secure resource may be received. Additionally, in some examples, the workflow to perform the step-up validation may be implemented at least in response to the request to access the second secure resource. The workflow implemented based at least in part on an attribute associated with the request. | 03-19-2015 |
20150082373 | PRIVILEGED ACCOUNT PLUG-IN FRAMEWORK - USAGE POLICIES - Techniques for managing privileged accounts via a privileged access management service are provided. In some examples, the service may be configured with a plug-in framework for accessing secure resources. In some aspects, a log-in request that includes authentication information and corresponds to the service may be received. Session access to at least one secure resource may be provided when a user is authenticated. In some examples, a request to perform an action associated with the secure resource may be received during the session. Additionally, in some examples, the plug-in framework may be implemented to determine whether the user is allowed to perform the action. Further, performance of the action may be allowed or denied during the session based on the determination. | 03-19-2015 |
Patent application number | Description | Published |
20120257503 | INTELLIGENT PRESENCE CONGESTION NOTIFICATION SERVICE - Various exemplary embodiments relate to a method performed by a network platform, the method including: receiving a subscriber ID and associated base station ID for a user equipment; receiving a congestion alert event message; identifying a user equipment on a congested base station; and notifying the user equipment on the congested base station. | 10-11-2012 |
20120294293 | METHOD AND APPARATUS FOR CONTROLLING WIRELESS ACCESS SELECTION - An wireless access selection capability is disclosed. In at least some embodiments, the wireless access selection capability enables a wireless user terminal to determine, via interaction with a mobility network (e.g., a 3G cellular network, a 4G cellular network, and the like), whether to remain connected via the mobility network or to connect via a Wireless Local Area Network (WLAN). The interaction may be in the form of two queries initiated by the wireless user terminal, including a first query for determining whether the wireless user terminal should perform a scan for identifying WLANs available for providing wireless access to the wireless user terminal and a second for determining whether the wireless user terminal should switch from being connected to the mobility network to being connected to an identified WLAN identified during a scan initiated by the wireless user terminal. | 11-22-2012 |
20120307635 | WIRELESS OPTIMIZED CONTENT DELIVERY NETWORK - A content delivery network of a communication system comprises a memory configured to store at least one secondary object for each of at least a subset of a plurality of primary objects accessible via a wireless network of the system. An associated processing device of the content delivery network is configured to receive a request from a user device for delivery of content comprising at least a given one of the primary objects, to select a particular object from the given primary object and its one or more corresponding secondary objects based on network congestion measurement information obtained for the wireless network, and to provide the selected particular object to the user device via the wireless network. A plurality of different secondary objects may be stored for the given primary object with each such primary or secondary object having a different level of resource requirements for delivery over the wireless network. | 12-06-2012 |
20120315879 | INTELLIGENT PRESENCE NOTIFICATION SERVICE - Various exemplary embodiments relate to a method performed by a messaging server in a wireless network, the method including: establishing a messaging connection with an intelligent presence server; establishing a messaging connection with a user equipment; receiving a message from the intelligent presence server; and pushing the message to the user equipment. | 12-13-2012 |
20120317270 | INTELLIGENT PRESENCE COST MANAGEMENT BASED UPON CONGESTION STATUS AND SUBSCRIBER PROFILE - Various exemplary embodiments relate to a method performed by a network platform, the method comprising: receiving a subscriber ID and associated base station ID and application IDs from a user equipment; receiving network congestion information from a network monitor; identifying an application affected by the network congestion; calculating a cost to the identified application due to the network congestion; and notifying the identified application of the calculated cost. | 12-13-2012 |
20130225122 | SYSTEM AND METHOD FOR NETWORK ACCESS VENDING - A system, method and apparatus for vending network access by determining access pricing or tariffs for one or more of a plurality of network access regions using one or more of an eNB cell congestion level, an eNB congestion level, a quality of service level, an access technology, a level of activity by a target subscriber and the like. The access pricing is offered to potential access purchasers along with optional metadata indicative of, illustratively, user equipment and network parameters associated with the cell or eNB. The pricing may be offered via an API to allow automatic purchase decisions by access purchasers. | 08-29-2013 |
20140148205 | PUSH SERVICE WITHOUT PERSISTENT TCP CONNECTION IN A MOBILE NETWORK - Methods, systems, and articles of manufacture for non-TCP push service in a mobile network comprise receiving, at a push server, registration information for a mobile device from a push client via a first internal interface without persistent TCP connection. The registration information includes a private IP address for the mobile device and a mobile device session identifier associated with an instance of an application client on the mobile device. A push trigger associated with an event of an application server is received at the push server via a second interface exposed outside of a service provider firewall. The push trigger includes a push trigger session identifier. When the push trigger session identifier matches the mobile device session identifier, the push trigger is determined to be associated with the instance of the application client on the mobile device and is transmitted to the push client without persistent TCP connection. | 05-29-2014 |