Patent application number | Description | Published |
20130268999 | DEVICE PINNING CAPABILITY FOR ENTERPRISE CLOUD SERVICE AND STORAGE ACCOUNTS - Device pinning capabilities for cloud-based services and/or storage accounts are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for authorizing synchronization of a synchronization client on a device with content associated with an account in the cloud-based service, responsive to determining that the device is on a list of devices that are authorized, and synchronizing the synchronization client on the device with the content associated with the account such that the content is also locally available for access on the device. The list of devices can be specific to and associated with devices for a user in the account and can be limited to an allowable number of devices for the account or a user associated with the account. | 10-10-2013 |
20140026181 | DATA LOSS PREVENTION (DLP) METHODS AND ARCHITECTURES BY A CLOUD SERVICE - Embodiments of the present disclosure include data loss prevention (DLP) methods and architectures by a cloud-based service. The disclosed techniques of the cloud-based platform (e.g., collaboration platform in an enterprise environment) can detect (and may optionally prevent) violations to, e.g., corporate policies, which can be configurable by a corporate administrator, for example regarding the use, storage, or transmission of sensitive information. The types of sensitive information can include, for example, financial information—credit card and bank account numbers, Personally Identifiable Information (PII)—Social Security Number (SSN), health/healthcare information, Intellectual Property—earnings forecasts, sales pipeline, trade secrets, source code, etc. | 01-23-2014 |
20140026182 | DATA LOSS PREVENTION (DLP) METHODS BY A CLOUD SERVICE INCLUDING THIRD PARTY INTEGRATION ARCHITECTURES - Embodiments of the present disclosure include data loss prevention methods by a cloud-based service including third party integration architectures. The disclosed techniques of the cloud-based platform (e.g., collaboration platform in an enterprise environment) can detect (and may optionally prevent) violations to, e.g., corporate policies, which can be configurable by a corporate administrator, for example, regarding the use, storage, and/or transmission of sensitive information. The types of sensitive information can include, for example, financial information—credit card and bank account numbers, Personally Identifiable Information (PII)—Social Security Number (SSN), health/healthcare information, Intellectual Property—earnings forecasts, sales pipeline, trade secrets, source code, etc. | 01-23-2014 |
20140032575 | SYSTEM AND METHOD FOR ADVANCED SEARCH AND FILTERING MECHANISMS FOR ENTERPRISE ADMINISTRATORS IN A CLOUD-BASED ENVIRONMENT - A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that permits advanced searches with advanced filtering mechanisms to be performed by administrators or other authorized individuals, across an organization, enterprise, or other select groups of entities in a cloud environment, such as a cloud-based collaborative environment. Various types, categories, metadata, and filters can be specified for use in the advanced search within select folders, users' folders, or across a larger set/group of folders and/or users. | 01-30-2014 |
20140033324 | SYSTEM AND METHOD FOR ADVANCED CONTROL TOOLS FOR ADMINISTRATORS IN A CLOUD-BASED SERVICE - A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides advanced control tools for administrators of an enterprise account. The advanced control tools permit the administrator to set mobile security settings for mobile devices running applications that allow a user to access enterprise data in the cloud-based platform; activity notification archiving; support for multiple email domains; automation processes; and policies. The settings selected by the administrator are applied enterprise-wide within the cloud-based platform. | 01-30-2014 |
20140259190 | SYSTEM AND METHOD FOR ENHANCED SECURITY AND MANAGEMENT MECHANISMS FOR ENTERPRISE ADMINISTRATORS IN A CLOUD-BASED ENVIRONMENT - A cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) is described that provides administrators with better visibility into content and activity across an enterprise account via advanced search tools and activity reports. Administrator tools are also provided that allow for actively managing content and passively monitoring content with real-time alerts sent to the administrator if usage of the cloud-based platform changes within the enterprise account. A reporting API is also supported by the cloud-based platform to permit the platform's activity logs to be retrieved by a third-party platform. Additionally, administrators are provided with the option to select two-step login verification of enterprise account users. | 09-11-2014 |
20140270178 | REMOTE KEY MANAGEMENT IN A CLOUD-BASED ENVIRONMENT - Systems and methods are disclosed for facilitating remote key management services in a collaborative cloud-based environment. In one embodiment, the remote key management architecture and techniques described herein provide for local key encryption and automatic generation of a reason code associated with content access. The reason code is used by a remote client device (e.g., an enterprise client) to control a second (remote) layer of key encryption. The remote client device provides client-side control and configurability of the second layer of key encryption. | 09-18-2014 |
20160065363 | ENHANCED REMOTE KEY MANAGEMENT FOR AN ENTERPRISE IN A CLOUD-BASED ENVIRONMENT - Systems and methods are disclosed for facilitating remote key management services in a collaborative cloud-based environment. In one embodiment, the remote key management architecture and techniques described herein provide for local key encryption and automatic generation of a reason code associated with content access. The reason code is logged by a hardware security module which is monitored by a remote client device (e.g., an enterprise client) to control a second (remote) layer of key encryption. The remote client device provides client-side control and configurability of the second layer of key encryption. | 03-03-2016 |
Patent application number | Description | Published |
20080299636 | SYSTEM AND METHOD FOR INACTIVATING MICROORGANISMS WITH A FEMTOSECOND LASER - The invention relates to a method of inactivating or diminishing the activity of microorganisms and an apparatus implementing that method. Microorganism activity is diminished through exciting the vibrational state of a microorganism with pulses of radiation femtoseconds in width. The wavelength of the pulses is in a range of the electromagnetic spectrum to which water is substantially transparent such as visible light. The pulses cause the microorganisms to vibrate such that their activities become diminished. A laser produces the pulses. A harmonic generator then acts upon the pulses to produce a scattering effect that is used to irradiate the microorganisms. One such laser is a titanium sapphire laser. One example of a harmonic generator is a nonlinear crystal such as a BBO crystal. The apparatus may also have a focusing lens such as a microscope objective that focuses the beam on a microorganism. The invention is effective for the inactivation of viruses or bacteria. The present invention may be utilized in order for extracting nucleic acid from microorganisms. The invention may be used in the manufacturing of vaccines. The invention enables the selective inactivation of target viruses and bacteria without causing cytotoxicity in mammalian cells. | 12-04-2008 |
20100136646 | Selective Inactivation Of Microorganisms With A Femtosecond Laser - A method is provided for selectively inactivating microorganisms with femtosecond pulsed lasers. Under proper laser conditions, irradiation of the femtosecond pulsed laser causes inactivation of pathogenic microorganisms, for example, viruses, bacteria and protozoa, without causing cytotoxicity in mammalian cells. Pathogenic microorganism activity is diminished through an impulsive stimulated Raman scattering process, that is, through the excitation of the low-energy vibrational state on the outer structure of a microorganism with femtosecond pulsed lasers. The wavelength of the laser pulses is in a range of the electromagnetic spectrum, for example, visible and near-infrared where water is substantially transparent. The method is utilized for cleansing blood components, disinfecting drinking water, treating viral and bacterial diseases, extracting nucleic acid from microorganisms, and for manufacturing vaccines. | 06-03-2010 |
Patent application number | Description | Published |
20100004223 | Crystalline Forms Of (R)-8-Chloro-1-Methyl-2,3,4,5-Tetrahydro-1H-3-Benzazepine Hydrochloride - The present invention is directed to crystalline forms of (R)-8-chloro-1-methyl-2,3,4,5-tetrahydro-1H-3-benzazepine, compositions containing the same, preparations, and uses thereof. | 01-07-2010 |
20120264743 | CRYSTALLINE FORMS OF (R)-8-CHLORO-1-METHYL-2,3,4,5-THTRAHYDRO-1H-3-BENZAZEPINE HYDROCHLORIDE - The present invention is directed to crystalline forms of (R)-8-chloro-1-methyl-2,3,4,5-tetrahydro-1H-3-benzazepine, compositions containing the same and uses thereof. | 10-18-2012 |
20140051684 | CRYSTALLINE FORMS OF (R)-8-CHLORO-1-METHYL-2,3,4,5-TETRAHYDRO-1H-3-BENZAZEPINE HYDROCHLORIDE - The present invention is directed to crystalline forms of (R)-8-chloro-1-methyl-2,3,4,5-tetrahydro-1H-3-benzazepine, compositions containing the same and uses thereof. | 02-20-2014 |