Patent application number | Description | Published |
20080293153 | Photolabile System with Instantaneous Fluorescence Reporting Function - A method of photofragmentation is provided comprising: providing a masked fluorescent molecule having a masking group bonded to a fluorescent molecule through a photolabile covalent bond; exposing the masked fluorescent molecule to cleaving photoradiation, producing an unmasked fluorescent molecule; detecting the fluorescence of the unmasked fluorescent molecule. The photolabile covalent bond disrupts the conjugation of the fluorescent molecule, causing the fluorescence to be masked. When the photolabile covalent bond is broken, the conjugation is restored, resulting in an increase in fluorescence of the fluorescent molecule as compared to the masked fluorescent molecule. | 11-27-2008 |
20080312092 | Photoinduced Signal Amplification Through Externally Sensitized Photofragmentation in Masked Photosensitizers - A method of photochemically amplifying the chemical signal associated with unmasking a photosensitizer and releasing a radical leaving group when a photochemical chain reaction is initiated by a sensitizer attached to a molecule of interest is provided. More specifically, provided is a method of photoinduced amplification comprising: providing a plurality of masked photosensitizers, each masked photosensitizer having a masking group bonded to a photosensitizer through a releasable covalent bond which disrupts the conjugation of the photosensitizer; providing a reaction photosensitizer in releasing proximity to a first masked photosensitizer; exciting the reaction photosensitizer with photoradiation, whereby the reaction photosensitizer induces release of the masking group from the first masked photosensitizer, producing a first unmasked photosensitizer which induces release of the masking group from a second masked photosensitizer in releasing proximity to the first masked photosensitizer, and so on. The release of the masking group from masked photosensitizer continues as long as masked photosensitizers are in releasing proximity to the reaction photosensitizer, or until a side reaction occurs which stops the chain propagation, or until the source of light is turned off. | 12-18-2008 |
20090247420 | METHOD FOR ENCODING AND SCREENING COMBINATORIAL LIBRARIES - A method of screening a library comprising: (i) providing either (a) a library comprising more than one copy of different library members, each copy of a different library member attached to a different releasable tag through a releasable covalent bond; where a plurality of tags uniquely encode each library member; or (b) a library comprising one or more copies of a library member attached to a support, with a plurality of tags uniquely encoding each library member; or (c) a library comprising different library members, each different library member attached to a plurality of tags uniquely encoding the different library member; (ii) providing a target compound with tethered sensitizer in specific binding proximity to the library, allowing specific binding of the target compound with tethered sensitizer to a selected library member; (iii) exciting the tethered sensitizer with excitation photoradiation, whereby the releasable tags attached to the selected library member are released; and (iv) detecting the releasable tags. | 10-01-2009 |
20110117667 | PHOTOINDUCED SIGNAL AMPLIFICATION THROUGH EXTERNALLY SENSITIZED PHOTOFRAGMENTATION IN MASKED PHOTOSENSITIZERS AND PHOTOAMPLIFIED FLUORESCENCE TURN-OFF SYSTEM - Provided is a photoamplified fluorescence turn-off assay where a masked photosensitizer is mixed with a fluorescent molecule. This mixture is brightly fluorescent because the masked photosensitizer is not capable of quenching the fluorophore. When the photosensitizer is released and amplified, the photosensitizer quenches the emission of fluorophores very efficiently. | 05-19-2011 |
Patent application number | Description | Published |
20100306268 | SYSTEM AND METHOD FOR IMPLEMENTING EFFECTIVE DATE CONSTRAINTS IN A ROLE HIERARCHY - A system providing a method for implementing effective date constraints in a role hierarchy is described. In one embodiment, for example, the method comprises the steps of: storing data that represents a first effective date constraint on a role of a role hierarchy, the first effective date constraint having a start date and an end date; storing data in a database that represents a second effective date constraint on a grant of the role to a grantee, the second effective date constraint having a start date and an end date; storing data in a database that represents a third effective date constraint on the grantee, the third effective date constraint having a start date and an end date; and computing a net effective date constraint for the role by computing the intersection of the first effective date constraint, the second effective date constraint, and the third effective date constraint. | 12-02-2010 |
20100318570 | PLUGGABLE SESSION CONTEXT - A method and apparatus are described for sharing a session to access a database. A database server receives, in a session, a session context identifier and a command. The session context identifier identifies a session context to use for the session. The session context is a set of information or commands that plug into a session state and specify how commands in the session are to be performed for a particular user or privilege level. In response to receiving the identifier, the database server associates the session context with the database session for the connection. The database server uses the session context to process the command. The session context may then be detached from the session, allowing another user to attach to the session via another session context. | 12-16-2010 |
20110023082 | TECHNIQUES FOR ENFORCING APPLICATION ENVIRONMENT BASED SECURITY POLICIES USING ROLE BASED ACCESS CONTROL - An application platform examines, at runtime, various specified aspects of an application environment in which an application interacts with a user. Such examinations are made to determine a state for each of the various specified aspects. Further, the platform automatically activates particular application environment roles for the user depending on the result of the examinations. For example, an application environment role may be activated representing a particular detected mode of communication (e.g., encrypted network communications) or a particular detected manner of authentication (e.g., password authentication). Such activations are based on the detected states and specified states for the various specified aspects of the application environment. Such activations may occur in the context of an application attempting to perform an operation on an access controlled object on behalf of a user. Further, such activations may occur in the context of establishing or maintaining a user session for a user of an application. | 01-27-2011 |