Patent application number | Description | Published |
20100048463 | TEMPLATE-FIXED PEPTIDOMIMETICS - The template-fixed B-hairpin peptidomimetics Cyclo(-Tyr-His-X-Cys-Ser-Ala- | 02-25-2010 |
20100093644 | TEMPLATE-FIXED PEPTIDOMIMETICS - Template-fixed β-hairpin peptidomimetics of the general formula (I) wherein Z is a template-fixed chain of 4 α-amino acid residues which, depending on their positions in the chain (counted starting from the N-terminal amino acid) are Gly, or of certain types which, as the remaining symbols in the above formula, are defined in the description and the claims, and salts thereof, have the property to agonize or to antagonize GPCR receptors such as CXCR3, urotensin and CCR10. They can be used as medicaments to treat or prevent diseases such as cardiovascular disorders, dermatological disorders, endocrine system and hormone disorders, metabolic diseases, inflammatory diseases, neurological diseases, respiratory diseases, haematological diseases and cancer. These β-hairpin peptidomimetics can be manufactured by a process which is based on a mixed solid- and solution phase synthetic strategy. | 04-15-2010 |
20110245155 | TEMPLATE-FIXED BETA-HAIRPIN PEPTIDOMIMETICS WITH CXCR4 ANTAGONIZING ACTIVITY - Template-fixed β-hairpin peptidomimetics of the general formula (I) | 10-06-2011 |
20130023483 | TEMPLATE-FIXED PEPTIDOMIMETICS WITH CXCR7 MODULATING ACTIVITY - Specific template-fixed β-hairpin peptidomimetics of the general formula (I) wherein the single elements T or P are α-amino acid residues connected from the carbonyl (C═O) point of attachment to the nitrogen (N) of the next element in clockwise direction and wherein said elements, depending on their positions in the chain, are defined in the description and the claims have the property to act on the receptor CXCR7. Thus, these β-hairpin peptidomimetics can be useful in the treatment or prevention of diseases or conditions in the area of dermatological disorders, metabolic diseases, inflammatory diseases, fibrotic diseases, infectious diseases, neurological diseases, cardiovascular diseases, respiratory diseases, gastro-intestinal tract disorders, urological diseases, ophthalmic diseases, stomatological diseases, haematological diseases and cancer; or the mobilisation of stem cells. | 01-24-2013 |
20130150299 | TEMPLATE-FIXED PEPTIDOMIMETICS - The template-fixed β-hairpin peptidomimetics Cyclo(-Tyr-His-X-Cys-Ser-Ala- | 06-13-2013 |
20140107031 | TEMPLATE-FIXED PEPTIDOMIMETICS - Template-fixed β-hairpin peptidomimetics of the general formula | 04-17-2014 |
20150080317 | TEMPLATE-FIXED PEPTIDOMIMETICS - The template-fixed B-hairpin peptidomimetics Cyclo(-Tyr-His-X-Cys-Ser-Ala- | 03-19-2015 |
20150087577 | TEMPLATE-FIXED BETA-HAIRPIN PEPTIDOMIMETICS WITH CXCR4 ANTAGONIZING ACTIVITY - Template-fixed β-hairpin peptidomimetics of the general formula (I) | 03-26-2015 |
Patent application number | Description | Published |
20090054345 | Template-Fixed Beta-Hairpin Peptidomimetics With Protease Inhibitory Activity - Templates-fixed β-hairpin peptidomimetics of the general formulae (I), wherein Z is a chain of 11α-amino acid residues which, depending on their positions in the chain (counted starting from the N-terminal amino acid) are Gly, or Pro, or Pro(4NHCOPhe), or of certain types which, as the remaining symbols in the above formula, are defined in the description and the claims, and salts thereof, have the property to inhibit proteases, in particular serine proteases, especially Cathepsin G or Elastase or Tryptase. These β-hairpin peptidomimetics can be manufactured by processes which are based on a mixed solid- and solution phase synthetic strategy. | 02-26-2009 |
20090118134 | Template Fixed Beta-Hairpin Loop Mimetics and Their Use in Phage Display - Template-fixed β-hairpin mime tics of the general formula R | 05-07-2009 |
20110135576 | DYE CONJUGATES OF TEMPLATE-FIXED PEPTIDOMIMETICS - Dye conjugates of template-fixed β-hairpin peptidomimetics of the general formula (I) wherein Z is a template-fixed chain of 14 α-amino acid residues which, depending on their positions in the chain (counted starting from the N-terminal amino acid), are Gly, or Pro or of certain types which, as the remaining symbols in the above formula, are defined in the description and the claims, and salts thereof, have CXCR4 antagonizing properties, and are useful for cancer therapy; diagnostic imaging; for detection of tumors and other abnormalities; for photoacoustic tumor imaging, detection and therapy; and for sonofluorescence tumor imaging, detection and therapy. The various dyes forming part of these conjugates are useful over the range of 300-1200 nm, the exact range being dependent upon the particular dye. These dye conjugates of β-hairpin peptidomimetic can be manufactured by processes which are based on a mixed solid- and solution phase synthetic strategy. | 06-09-2011 |
20110294702 | TEMPLATE FIXED BETA-HAIRPIN LOOP MIMETICS AND THEIR USE IN PHAGE DISPLAY - Template-fixed β-hairpin mimetics and libraries including a plurality of these mimetics are provided. The template-fixed β-hairpin mimetics are of the following general formula: | 12-01-2011 |
20110319291 | TEMPLATE FIXED BETA-HAIRPIN LOOP MIMETICS AND THEIR USE IN PHAGE DISPLAY - Template-fixed β-hairpin mimetics and libraries including a plurality of these mimetics are provided. The template-fixed β-hairpin mimetics are of the following general formula: | 12-29-2011 |
20140213531 | TEMPLATE-FIXED BETA-HAIRPIN PEPTIDOMIMETICS WITH PROTEASE INHIBITORY ACTIVITIY - Template-fixed β-hairpin peptidomimetics of the general formulae | 07-31-2014 |
Patent application number | Description | Published |
20120096546 | Edge server HTTP POST message processing - A CDN edge server process receives an HTTP message, takes a given action with respect to that message, and then forwards a modified version of the message to a target server, typically a server associated with a CDN customer. The process may include an associated intermediate processing agent (IPA) or a sub-processing thread to facilitate the given action. In one embodiment, the message is an HTTP POST, and the given action comprises the following: (i) recognizing the POST, (ii) removing given data from the POST, (iii) issuing an intermediate (or subordinate) request to another process (e.g., a third party server), passing the given data removed from the POST to the process, (iv) receiving a response to the intermediate request, (v) incorporating data received from or associated with the response into a new HTTP message, and (vi) forwarding the new HTTP message onto the target server. In this manner, the given data in the POST may be protected as the HTTP message “passes through” the edge server on its way from the client to the target (merchant) server. In an alternative embodiment, data extracted from the POST message is enhanced by passing the data to an externalized process and adding a derived value (such as a fraud risk score based on the data) back into the message. | 04-19-2012 |
20120124372 | Protecting Websites and Website Users By Obscuring URLs - Websites and website users are subject to an increasing array of online threats and attacks. Disclosed herein are, among other things, approaches for protecting websites and website users from online threats. For example, a content server, such as a proxying content delivery network (CDN) server that is delivering content on behalf of an origin server, can modify URLs as they pass through the content server to obscured values that are given to the end-user client browser. The end-user browser can use the obscured URL to obtain content from the content server, but the URL may be valid only for a limited time, and may be invalid for obtaining content from the origin. Hence, information is hidden from the client, making attacks against the website more difficult and frustrating client-end malware that leverages knowledge of browsed URLs. | 05-17-2012 |
20120203861 | METHODS AND SYSTEMS FOR DELIVERING CONTENT TO DIFFERENTIATED CLIENT DEVICES - Methods and systems are disclosed for delivery of tailored content to differentiated devices, such as desktop, mobile, and tablet devices, over a computer network. In one embodiment, a proxy cache server has a content cache for storing previously retrieved objects like web pages or multimedia files. For at least some objects, several versions are stored, each version representing an object suited for a given set of client device characteristics. A device-equivalency data structure maintained at the proxy facilitates a determination of whether such cached versions can be used to service a current request. The versions might represent, for example, modified versions created using, e.g., mobile device transcoding techniques, in response to prior requests. They may also represent a set of alternate content created by a content provider and available from an origin server. Such methods and systems may be implemented in a distributed computing networks, e.g., a content delivery network. | 08-09-2012 |
20120259942 | Proxy server with byte-based include interpreter - According to this disclosure, a proxy server is enhanced to be able to interpret instructions that specify how to modify an input object to create an output object to serve to a requesting client. Typically the instructions operate on binary data. For example, the instructions can be interpreted in a byte-based interpreter that directs the proxy as to what order, and from which source, to fill an output buffer that is served to the client. The instructions specify what changes to make to a generic input file. This functionality extends the capability of the proxy server in an open-ended fashion and enables it to efficiently create a wide variety of outputs for a given generic input file. The generic input file and/or the instructions may be cached at the proxy. The teachings hereof have applications in, among other things, the delivery of web content, streaming media, and the like. | 10-11-2012 |
20120265853 | FORMAT-AGNOSTIC STREAMING ARCHITECTURE USING AN HTTP NETWORK FOR STREAMING - This patent document describes, among other things, distributed computer platforms for online delivery of multimedia, including HD video, at broadcast audience scale to a variety of runtime environments and client devices in both fixed line and mobile environments. The teachings hereof can be applied to deliver live and on-demand content streams via computer networks. The teachings also relate to the ingestion of content streams in a given source format and the serving of the stream in a given target format. For example, a system might have machines in a content delivery network that ingest live streams in a source format, use an intermediate format to transport the stream within the system, and output the stream in a target format to clients that have requested (e.g., with an HTTP request) the stream. The streams may be archived for later playback. | 10-18-2012 |
20140006484 | Site acceleration with customer prefetching enabled through customer-specific configurations | 01-02-2014 |
20140101758 | SERVER WITH MECHANISM FOR REDUCING INTERNAL RESOURCES ASSOCIATED WITH A SELECTED CLIENT CONNECTION - According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use, and the server is able to free resources such as memory and processing cycles previously allocated to the connection. In some cases, the server maintains the connection for at least some time and uses it to keep the client occupied so that it cannot launch—or has fewer resources to launch—further attacks, and possibly to gather information about the attacking client. | 04-10-2014 |
20150019633 | METHODS AND APPARATUS FOR MAKING BYTE-SPECIFIC MODIFICATIONS TO REQUESTED CONTENT - According to this disclosure, a proxy server is enhanced to be able to interpret instructions that specify how to modify an input object to create an output object to serve to a requesting client. Typically the instructions operate on binary data. For example, the instructions can be interpreted in a byte-based interpreter that directs the proxy as to what order, and from which source, to fill an output buffer that is served to the client. The instructions specify what changes to make to a generic input file. This functionality extends the capability of the proxy server in an open-ended fashion and enables it to efficiently create a wide variety of outputs for a given generic input file. The generic input file and/or the instructions may be cached at the proxy. The teachings hereof have applications in, among other things, the delivery of web content, streaming media, and the like. | 01-15-2015 |
20150040221 | SERVER WITH MECHANISM FOR CHANGING TREATMENT OF CLIENT CONNECTIONS DETERMINED TO BE RELATED TO ATTACKS - According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use. According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended by enabling the server to determine that any of a client and a connection exhibits one or more attack characteristics (e.g., based on at least one of client attributes, connection attributes, and client behavior during the connection, or otherwise). As a result of the determination, the server changes its treatment of the connection. | 02-05-2015 |
20150100660 | SYSTEMS AND METHODS FOR CACHING CONTENT WITH NOTIFICATION-BASED INVALIDATION - Described herein are systems, devices, and methods for content delivery on the Internet. In certain non-limiting embodiments, a caching model is provided that can support caching for indefinite time periods, potentially with infinite or relatively long time-to-live values, yet provide prompt updates when the underlying origin content changes. In one approach, an origin server can annotate its responses to content requests with tokens, e.g., placing them in an appended HTTP header or otherwise. The tokens can drive the process of caching, and can be used as handles for later invalidating the responses within caching proxy servers delivering the content. Tokens may be used to represent a variety of kinds of dependencies expressed in the response, including without limitation data, data ranges, or logic that was a basis for the construction of the response. | 04-09-2015 |
20150100664 | SYSTEMS AND METHODS FOR CACHING CONTENT WITH NOTIFICATION-BASED INVALIDATION WITH EXTENSION TO CLIENTS - Described herein are systems, devices, and methods for content delivery on the Internet. In certain non-limiting embodiments, a caching model is provided that can support caching for indefinite time periods, potentially with infinite or relatively long time-to-live values, yet provide prompt updates when the underlying origin content changes. In one approach, an origin server can annotate its responses to content requests with tokens, e.g., placing them in an appended HTTP header or otherwise. The tokens can drive the process of caching, and can be used as handles for later invalidating the responses within caching proxy servers delivering the content. This caching and invalidation model can be extended out to clients, such that clients may be notified of invalid data and obtain timely updates. | 04-09-2015 |
20150207897 | SYSTEMS AND METHODS FOR CONTROLLING CACHEABILITY AND PRIVACY OF OBJECTS - Described herein are systems, devices, and methods for content delivery on the Internet. In certain non-limiting embodiments, a caching model is provided that can support caching for indefinite time periods, potentially with infinite or relatively long time-to-live values, yet provide prompt updates when the underlying origin content changes. Origin-generated tokens can drive the process of caching, and can be used as handles for later invalidating origin responses within caching proxy servers delivering the content. Tokens can also be used to control object caching behavior at a server, and in particular to control how an object is indexed in cache and who it may be served to. Tokens may indicate, for example, that responses to certain requested URL paths are public, or may be used to map user-id in a client request to a group for purposes of locating valid cache entries in response to subsequent client requests. | 07-23-2015 |
20150281331 | SERVER INITIATED MULTIPATH CONTENT DELIVERY - Described herein are—among other things—systems, methods, and apparatus for accelerating and increasing the reliability of content delivery by serving objects redundantly over multiple paths from multiple servers. In preferred embodiments, the decision to use such multipath delivery is made on the server side. A content server can modify or generate a given web page so as to invoke multipath, e.g., by injecting markup language directives and/or script instructions that will cause the client device to make multiple requests for a given object on the page. Preferably the multiple requests are made to separate content servers in separate points of presence. The teachings hereof may be advantageously implemented, without limitation, in intermediary servers such as caching proxy servers and/or in origin servers. | 10-01-2015 |
20150310126 | CREATION AND DELIVERY OF PRE-RENDERED WEB PAGES FOR ACCELERATED BROWSING - The process of rendering web pages can be significantly improved with a content delivery system that pre-renders web content for a client device. A web page “program” can be pre-executed and the result delivered to a requesting client device, rather than or before sending a traditional set of web page components, such as a markup language document, cascading style sheets, embedded objects. This pre-execution can relieve the client device of the burden of rendering the web page, saving resources and decreasing latency before the web page is ready, and can reduce the number of network requests that the client device must make before being able to display the page. Disclosed herein are methods, systems, and devices for creating and delivering pre-rendered web pages for accelerated browsing. | 10-29-2015 |