Patent application number | Description | Published |
20110144154 | Salts of 2-Substituted Quinolines - The invention relates to salts of 2-substituted quinolines, the manufacturing method for same, and use of the same for the production of drugs. Said salts are advantageous in that the same can be obtained in crystalline form, which facilitates their implementation in the manufacture of pharmaceutical compositions. | 06-16-2011 |
20120225903 | Novel 2-Substituted Quinoline Derivatives, And Method For Preparing Same - The invention relates to 2-substituted quinoline derivatives, to a method for preparing same, and to the use thereof for drug production, particularly for treating infections caused by protozoa, such as leishmaniases, trypanosomiases, toxoplasmoses, and/or infections caused by retroviruses such as, for example, HIV or HTLV. | 09-06-2012 |
Patent application number | Description | Published |
20090138937 | ENHANCED SECURITY AND PERFORMANCE OF WEB APPLICATIONS - A client-side enforcement mechanism may allow application security policies to be specified at a server in a programmatic manner. Servers may specify security policies as JavaScript functions included in a page returned by the server and run before other scripts. At runtime, and during initial loading, the functions are invoked by the client on each page modification to ensure the page conforms to the security policy. As such, before a mutation takes effect, the policy may transform that mutation and the code and data of the page. Replicated code execution may take place at both the client and the server where the server runs its own shadow copy of a client-side application in a trusted execution environment so that the server may check that the method calls coming from the client correspond to a correct execution of the client-side application The redundant execution at the client can be untrusted, but serves to improve the responsiveness and performance of the Web application. | 05-28-2009 |
20090285127 | SYSTEM AND METHOD FOR NETWORK TOPOLOGY DISCOVERY - A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology. | 11-19-2009 |
20100106767 | AUTOMATICALLY SECURING DISTRIBUTED APPLICATIONS - A processing system for distributed multi-tier applications is provided. The system includes a server component that executes a replica of a client-side application, where a client component executes the client-side application. The client component captures events from the client-side application and transmits the events to the replica to validate the computational integrity security of the application. | 04-29-2010 |
20120017263 | Security Authorization Queries - In an example implementation, a bifurcated security scheme has a first level that does not allow usage of negations and a second level that does permit usage of negations. In another example implementation, an authorization query table maps respective resource-specific operations to respective associated authorization queries. In yet another example implementation, authorization queries are permitted to have negations, but individual assertions are not. | 01-19-2012 |
20140165139 | Security Language Translations with Logic Resolution - Security language constructs may be translated into logic language constructs and vice versa. Logic resolution may be effected using, for example, the logic language constructs. In an example implementation, translation of a security language assertion into at least one logic language rule is described. In another example implementation, translation of a proof graph reflecting a logic language into a proof graph reflecting a security language is described. In yet another example implementation, evaluation of a logic language program using a deterministic algorithm is described. | 06-12-2014 |
20140282879 | Automatically Securing Distributed Applications - A processing system for distributed multi-tier applications is provided. The system includes a server component that executes a replica of a client-side application, where a client component executes the client-side application. The client component captures events from the client-side application and transmits the events to the replica to validate the computational integrity security of the application. | 09-18-2014 |