Patent application number | Description | Published |
20110200982 | GENETICALLY MODIFIED MICE AND ENGRAFTMENT - A mouse with a humanization of the mIL-3 gene and the mGM-CSF gene, a knockout of a mRAG gene, and a knockout of a mIl2rg subunit gene; and optionally a humanization of the TPO gene is described. A RAG/Il2rg KO/hTPO knock-in mouse is described. A mouse engrafted with human hematopoietic stem cells (HSCs) that maintains a human immune cell (HIC) population derived from the HSCs and that is infectable by a human pathogen, e.g., | 08-18-2011 |
20130022996 | GENETICALLY MODIFIED MICE AND ENGRAFTMENT - A mouse with a humanization of the mIL-3 gene and the mGM-CSF gene, a knockout of a mRAG gene, and a knockout of a mII2rg subunit gene; and optionally a humanization of the TPO gene is described. A RAG/II2rg KO/hTPO knock-in mouse is described. A mouse engrafted with human hematopoietic stem cells (HSCs) that maintains a human immune cell (HIC) population derived from the HSCs and that is infectable by a human pathogen, e.g., | 01-24-2013 |
20130024957 | GENETICALLY MODIFIED MICE AND ENGRAFTMENT - A mouse with a humanization of the mIL-3 gene and the mGM-CSF gene, a knockout of a mRAG gene, and a knockout of a mII2rg subunit gene; and optionally a humanization of the TPO gene is described. A RAG/II2rg KO/hTPO knock-in mouse is described. A mouse engrafted with human hematopoietic stem cells (HSCs) that maintains a human immune cell (HIC) population derived from the HSCs and that is infectable by a human pathogen, e.g., | 01-24-2013 |
20130042330 | HUMANIZED M-CSF MICE - Genetically modified mice comprising a nucleic acid sequence encoding a human M-CSF protein are provided. Also provided are genetically modified mice comprising a nucleic acid sequence encoding a human M-CSF protein that have been engrafted with human cells such as human hematopoietic cells, and methods for making such engrafted mice. These mice find use in a number of applications, such as in modeling human immune disease and pathogen infection; in in vivo screens for agents that modulate hematopoietic cell development and/or activity, e.g. in a healthy or a diseased state; in in vivo screens for agents that are toxic to hematopoietic cells; in in vivo screens for agents that prevent against, mitigate, or reverse the toxic effects of toxic agents on hematopoietic cells; in in vivo screens of human hematopoietic cells from an individual to predict the responsiveness of an individual to a disease therapy, etc. | 02-14-2013 |
20130340105 | Human SIRPAalpha Transgenic Animals and Their Methods of Use - The invention relates generally to compositions and methods of using transgenic non-human animals expressing human SIRPα that are engrafted with a human hematopoietic system. In various embodiments, the human hematopoietic system engrafted, human SIRPα transgenic non-human animals of the invention are useful as systems for the in vivo evaluation of the growth and differentiation of hematopoietic and immune cells, for the in vivo assessment of an immune response, for the in vivo evaluation of vaccines and vaccination regimens, for in vivo production and collection of immune mediators, including human antibodies, and for use in testing the effect of agents that modulate hematopoietic and immune cell function. | 12-19-2013 |
20140090095 | Genetically Modified Mice and Engraftment - A mouse with a humanization of the mIL-3 gene and the mGM-CSF gene, a knockout of a mRAG gene, and a knockout of a mIl2rg subunit gene; and optionally a humanization of the TPO gene is described. A RAG/Il2rg KO/hTPO knock-in mouse is described. A mouse engrafted with human hematopoietic stem cells (HSCs) that maintains a human immune cell (HIC) population derived from the HSCs and that is infectable by a human pathogen, e.g., | 03-27-2014 |
20150047061 | Humanized M-CSF Mice - Genetically modified mice comprising a nucleic acid sequence encoding a human M-CSF protein are provided. Also provided are genetically modified mice comprising a nucleic acid sequence encoding a human M-CSF protein that have been engrafted with human cells such as human hematopoietic cells, and methods for making such engrafted mice. These mice find use in a number of applications, such as in modeling human immune disease and pathogen infection; in in vivo screens for agents that modulate hematopoietic cell development and/or activity, e.g. in a healthy or a diseased state; in in vivo screens for agents that are toxic to hematopoietic cells; in in vivo screens for agents that prevent against, mitigate, or reverse the toxic effects of toxic agents on hematopoietic cells; in in vivo screens of human hematopoietic cells from an individual to predict the responsiveness of an individual to a disease therapy, etc. | 02-12-2015 |
Patent application number | Description | Published |
20140108790 | Secure Communication Methods - Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic. | 04-17-2014 |
20140108791 | Secure Communication Architecture Including Sniffer - Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic. | 04-17-2014 |
20140108820 | Secure Communication Architecture - Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic. | 04-17-2014 |
20140108821 | Trusted Data Relay - Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic. | 04-17-2014 |
Patent application number | Description | Published |
20100235908 | System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Analysis - A system and method for identifying the change of user behavior on a website includes analyzing the actions of users on a website comprising a plurality of parameters or parameters that identify the actions performed on a website including parameters or fields related to previous actions by that user or other users of the website. The parameters or fields are represented in a vector format where each vector represents a different session of activity on the website, page of the website, user of the website, or other attribute of the use of a website. Analysis is performed to determine if new sessions are similar or dissimilar to previously known sessions. | 09-16-2010 |
20100235909 | System and Method for Detection of a Change in Behavior in the Use of a Website Through Vector Velocity Analysis - A system and software for identifying the change of user behavior on a website includes analyzing the actions of users on a website comprising a plurality of fields or input parameters that identify the actions performed on a website including fields related to previous actions by that user or other users of the website. The fields or input parameters are represented in a vector format where vectors represent different sessions of activity on the website, pages of the website, users of the website, or other attributes of the use of a website. Analysis is performed to determine if new sessions are similar or dissimilar to previously known sessions and if a session is converging or diverging from known sessions based on the velocity and direction of the velocity of the vectors in the vector space. | 09-16-2010 |
20110214187 | System and Method for Network Security Including Detection of Attacks Through Partner Websites - A computer readable storage medium with instructions executable on a host computer. The instructions record a relationship between a partner site and the host computer, substitute a reference to the partner site with a partner site alias referencing the host computer, deliver the partner site alias to a client, replace the partner site alias for the reference to the partner site in response to receiving the partner site alias from the client and augment the address of the client with an address alias. The address alias is sent to the partner site. A partner action and the address alias are received from the partner site. The address is exchanged for the address alias. The partner action is delivered to the client utilizing the address. These operations are monitored to identify client activity that constitutes a security threat at the host computer or the partner site. | 09-01-2011 |
20110302653 | System and Method for Network Security Including Detection of Attacks Through Partner Websites - A computer readable storage medium has instructions for execution on a computer. The instructions monitor transactions between a server and a set of clients. An evaluation of session indicators associated with the transactions is performed. Individual sessions between the server and individual clients of the plurality of clients are isolated in response to the evaluation. | 12-08-2011 |
20120016633 | SYSTEM AND METHOD FOR AUTOMATIC DETECTION OF ANOMALOUS RECURRENT BEHAVIOR - A non-transitory computer readable storage medium includes executable instructions to observe the distribution of the frequency of a recurrent behavior to form a histogram. A rehistogram of the histogram is computed to model the distribution of the frequency of the frequency of the recurrent behavior. The rehistogram provides an individual frequency relative to the total frequency of the recurrent behavior. The individual frequency is compared to a predicted frequency to form a difference frequency. An anomaly event is identified when the difference frequency exceeds an anomaly threshold. | 01-19-2012 |
20140149569 | CORRELATIVE MONITORING, ANALYSIS, AND CONTROL OF MULTI-SERVICE, MULTI-NETWORK SYSTEMS - Methods and devices for correlative monitoring, analysis, and control of multi-service, multi-network systems are provided herein. Exemplary methods may include generating a network topology graph of a metanetwork using traffic records obtained from the metanetwork, generating a causal digraph of the metanetwork using the traffic records and the network topology graph, and transmitting one or more of the network topology graph and the causal digraph to a computing system. | 05-29-2014 |