Patent application number | Description | Published |
20090270350 | Pyridinone Pyrazole Urea and Pyrimidinone Pyrazole Urea Derivatives - This invention is directed generally to substituted pyridinone and pyrimidinone compounds that generally inhibit p38 kinase, TNF, and/or cyclooxygeπase activity. Such substituted pyridinone and pyrimidinone compounds include compounds generally corresponding in structure to the following formula: wherein Z, n, R | 10-29-2009 |
20120142696 | SUBSTITUTED INDOLE/INDAZOLE-PYRIMIDINYL COMPOUNDS - The present disclosure provides indole/indazole-pyrimidinyl compounds useful in the treatment of p38 kinase mediated diseases, such as lymphoma and auto-inflammatory disease, having the structure of Formula (I): | 06-07-2012 |
20120142708 | SUBSTITUTED PYRIDINE UREA COMPOUNDS - The present disclosure provides pyridine urea compounds useful in the treatment of p38 kinase mediated diseases, such as lymphoma and auto-inflammatory disease, having the structure of Formula (I): | 06-07-2012 |
20120142709 | SUBSTITUTED PYRIDINONE-PYRIDINYL COMPOUNDS - The present disclosure provides pyridinone-pyridinyl compounds useful in the treatment of p38 kinase mediated diseases, such as lymphoma and auto-inflammatory disease, having the structure of Formula (I): | 06-07-2012 |
20130143906 | SUBSTITUTED PYRIMIDINONE-PHENYL-PYRIMIDINYL COMPOUNDS - The present disclosure provides pyrimidinone-phenyl-pyrimidinyl compounds useful in the treatment of p38 kinase mediated diseases, such as lymphoma and inflammatory disease, having the structure of Formula (I): | 06-06-2013 |
20130274272 | METHYL/DIFLUOROPHENYL-METHOXY SUBSTITUTED PYRIDINONE-PYRIDINYL COMPOUNDS, METHYL-PYRIDINYL-METHOXY SUBSTITUTED PYRIDINONE-PYRIDINYL COMPOUNDS, AND METHYL-PYRIMIDINYL-METHOXY SUBSTITUTED PYRIDINONE-PYRIDINYL COMPOUNDS - The present disclosure provides methyl/difluorophenyl-methoxy substituted pyridinone-pyridinyl compounds, methyl-pyridinyl-methoxy substituted pyridinone-pyridinyl compounds, and methyl-pyrimidinyl-methoxy substituted pyridinone-pyridinyl compounds useful in the treatment of p38 kinase mediated diseases, such as lymphoma and auto-inflammatory disease, having the structure of Formula (I): | 10-17-2013 |
20140171449 | SUBSTITUTED PYRIDINONE-PYRIDINYL COMPOUNDS - The present disclosure provides pyridinone-pyridinyl compounds useful in the treatment of p38 kinase mediated diseases, such as lymphoma and auto-inflammatory disease, having the structure of Formula (I): | 06-19-2014 |
20140171450 | SUBSTITUTED PYRIDINONE-PYRIDINYL COMPOUNDS - The present disclosure provides pyridinone-pyridinyl compounds useful in the treatment of p38 kinase mediated diseases, such as lymphoma and auto-inflammatory disease, having the structure of Formula (I): | 06-19-2014 |
Patent application number | Description | Published |
20090083833 | AUTHENTICATION WITH PHYSICAL UNCLONABLE FUNCTIONS - Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs corresponding to individual PUFs can be enrolled and used to determine authentication data, which may be managed in a database. Later when a target object with a PUF is intended to be authenticated a set (or subset) of challenges are applied to each PUF device to authenticate it and thus distinguish it from others. In some examples, authentication is achieved without requiring complex cryptography circuitry implemented on the device. Furthermore, an authentication station does not necessarily have to be in communication with an authority holding the authentication data when a particular device is to be authenticated. | 03-26-2009 |
20090158054 | PRIVATE DATA PROCESSING - A method for processing one or more terms includes, at a first computation facility, computing an obfuscated numerical representation for each of the terms. The computed obfuscated representations are provided from the first facility to a second computation facility. A result of an arithmetic computation based on the provided obfuscated values is received at the first facility. This received result represents an obfuscation of a result of application of a first function to the terms. The received result is processed to determine the result of application of the first function to the terms. | 06-18-2009 |
20090222672 | Integrated Circuit That Uses A Dynamic Characteristic Of The Circuit - An integrated circuit has a first component that has a dynamic characteristic that varies among like integrated circuits, for example, among integrated circuits fabricated using the same lithography mask. Operating the first component produces an output that is dependent on the dynamic characteristic of the first component. A digital value associated with the integrated circuit is generated using the output of the first component, and then the generated digital value is used in operation of the integrated circuit. | 09-03-2009 |
20090254981 | Volatile Device Keys And Applications Thereof - A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software. | 10-08-2009 |
20100127822 | NON-NETWORKED RFID-PUF AUTHENTICATION - An integrated circuit includes a sequence generator configured to generate a series of challenges; a hidden output generator configured to generate a series of hidden outputs, each hidden output a function of a corresponding challenge in the series of challenges; and bit reduction circuitry configured to generate a response sequence including a plurality of response parts, each response part a function of a corresponding plurality of hidden outputs. | 05-27-2010 |
20100272255 | SECURELY FIELD CONFIGURABLE DEVICE - A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data. | 10-28-2010 |
20110033041 | INDEX-BASED CODING WITH A PSEUDO-RANDOM SOURCE - Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of outputs from pseudo-random source(s). In some examples, the numerical ordering of re-generated device-specific quantities is used to re-generate the hidden value, without necessarily requiring additional error correction mechanisms. Information leak may be reduced by constructing system whose “syndrome” helper bits are random, as measured, for example, by NIST's Statistical Tests for Randomness In some examples, index based coding provides coding gain that exponentially reduces total error correction code complexity, resulting in efficiently realizable PRS-based key generation systems. In some examples, index based coding allows noisy PRS to be robust across conditions where conventional error correction code cannot error correct. | 02-10-2011 |
20110258420 | EXECUTION MIGRATION - An execution migration approach includes bringing the computation to the locus of the data: when a memory instruction requests an address not cached by the current core, the execution context (current program counter, register values, etc.) moves to the core where the data is cached. | 10-20-2011 |
20120033810 | AUTHENTICATION OF INTEGRATED CIRCUITS - A group of devices are fabricated based on a common design, each device having a corresponding plurality of measurable characteristics that is unique in the group to that device, each device having a measurement module for measuring the measurable characteristics. Authentication of one of the group of devices is enabled by selective measurement of one or more of the plurality of measurable characteristics of the device. | 02-09-2012 |
20120183135 | RELIABLE PUF VALUE GENERATION BY PATTERN MATCHING - A method is used to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical Unclonable Function (PUF) circuit elements. The method reverses the conventional paradigm of using public challenges to generate secret PUF responses; it exposes the response and keeps the particular challenges that generate the response secret. | 07-19-2012 |
20120290845 | SOFT MESSAGE SIGNING - A message is signed using a PUF without having to exactly regenerate a cryptographic key. Another party that shares information about the PUF is able to verify the signature to a high degree of accuracy (i.e., high probability of rejection of a forged signature and a low probably of false rejection of a true signature). In some examples, the information shared by a recipient of a message signature includes a parametric model of operational characteristics of the PUF used to form the signature. | 11-15-2012 |
20120301433 | BACTERIOPHAGES EXPRESSING AMYLOID PEPTIDES AND USES THEREOF - The present invention generally relates to engineered bacteriophages which express amyloid peptides for the modulation (e.g. increase or decrease) of protein aggregates and amyloid formation. In some embodiments, the engineered bacteriophages express anti-amyloid peptides for inhibiting protein aggregation and amyloid formation, which can be useful in the treatment and prevention of and bacterial infections and biofilms. In some embodiments, the engineered bacteriophages express amyloid peptides for promoting amyloid formation, which are useful for increasing amyloid formation such as promoting bacterial biofilms. Other aspects relate to methods to inhibit bacteria biofilms, and methods for the treatment of amyloid related disorders, e.g., Alzheimer's disease using an anti-amyloid peptide engineered bacteriophages. Other aspects of the invention relate to engineered bacteriophages to express the amyloid peptides on the bacteriophage surface and/or secrete the amyloid peptides, e.g., anti-amyloid peptides and pro-amyloid peptides, and uses thereof for modulation protein aggregates and amyloid formation. | 11-29-2012 |
20130010957 | CRYPTOGRAPHIC SECURITY USING FUZZY CREDENTIALS FOR DEVICE AND SERVER COMMUNICATIONS - An approach to cryptographic security uses a “fuzzy” credential, in contrast to a “hard” credential, to eliminate cryptographic algorithmic repeatability on a device that may be subject to physical attacks. By eliminating repeatability performed at an algorithmic (e.g., gate or software) level, a device inherently lacks one of the fundamental setup assumptions associated with certain classes of side channel, fault injection, timing, and related attacks, thus helps to protect the system against such attacks while preserving the cryptographic security of the system. | 01-10-2013 |
20130298211 | AUTHENTICATION TOKEN - The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The token interacts with a device and authenticates the user to the system. The token may be part of the device or stand alone. The various aspects of the present invention capture a novel design for an authentication token that eliminates the need for user interaction with the token. | 11-07-2013 |
20150026545 | SYSTEM AND METHOD FOR GENERATING CONSTELLATION-BASED INFORMATION CODING USING PHYSICAL NOISY PSEUDO-RANDOM SOURCES - A method and system are provided for a symbol-oriented approach that addresses information recovery from manufacturing variations (MVs) readings in a high noise environment. The multi-bits-per-symbol approach, which is in accordance with the various aspects of the present invention, is in contrast with how manufacturing-variation-derived bits are normally treated in the context of PUF Key Generation's error correction process. The multi-bit-per-symbol approach also offers a natural distance metric (distance to the most-likely symbol, distance to the next-most-likely symbol, etc.) which can aid soft-decision decoding or list-decoding, and can be used to improve the provisioning of a more reliably encoded secret and its associated helper data value. | 01-22-2015 |