Patent application number | Description | Published |
20090233291 | Paired end sequencing - An embodiment of a method for obtaining a DNA construct comprising two end regions of a target nucleic acid in an in vitro reaction is described that comprises the steps of: fragmenting a large nucleic acid molecule to produce a target nucleic acid molecule; ligating a recombination adaptor element to each end of the target nucleic acid molecule to produce an adapted target nucleic acid molecule; exposing the adapted target nucleic acid to a site specific recombinase to produce a circular nucleic acid product and a linear nucleic acid product from the adapted target nucleic acid, wherein the circular nucleic acid product comprises the target nucleic acid molecule; and fragmenting the circular nucleic acid product to produce a template nucleic acid molecule comprising a sequence region from each end of the target nucleic acid molecule. | 09-17-2009 |
20100222232 | ENRICHMENT AND SEQUENCE ANALYSIS OF GENOMIC REGIONS - The present invention provides novel methods for reducing the complexity of preferably a genomic sample for further analysis such as direct DNA sequencing, resequencing or SNP calling. The methods use pre-selected immobilized oligonucleotide probes to capture target nucleic acid molecules from a sample containing denatured, fragmented (genomic) nucleic acids for reducing the genetic complexity of the original population of nucleic acid molecules. | 09-02-2010 |
20120077716 | SYSTEM AND METHOD FOR PRODUCING FUNCTIONALLY DISTINCT NUCLEIC ACID LIBRARY ENDS THROUGH USE OF DEOXYINOSINE - An embodiment of a nucleic acid adaptor is described that comprises a double stranded nucleic acid element that comprises a plurality of deoxyinosine species positionally located in a spaced relationship from each other on a first strand and base pair to an A, T, or G nucleotide species on a second strand, where a first end of the double stranded nucleic acid element is constructed and arranged to preferentially ligate to each end of a double stranded target nucleic acid molecule. | 03-29-2012 |
20130217023 | System And Method For Generation And Use Of Compact Clonally Amplified Products - A method for sequencing a nucleic acid is described that comprises the steps of: coupling an adaptor to at least one end of a template nucleic acid molecule; circularizing the adaptor coupled nucleic acid molecule; amplifying the adaptor coupled nucleic acid molecule to form a linear amplified concatamer molecule comprising a plurality of copies of the template nucleic acid molecule; compacting the linear amplified concatamer molecule with a branched polyelectrolyte species to form a branched polyelectrolyte compacted amplified concatamer molecule; and sequencing the branched polyelectrolyte compacted amplified concatamer molecule to produce a sequence composition of the template nucleic acid molecule. | 08-22-2013 |
20150056662 | System and Method for Nucleic Acid Amplification - An embodiment of a method for generating a population of amplified concatamer products is described that comprises amplifying a template nucleic acid molecule using a first nucleic acid primer immobilized on a bead substrate and a second nucleic acid primer in solution to generate a population of substantially identical copies of the template nucleic acid molecule immobilized on the bead substrate; and amplifying the population of substantially identical copies of the template nucleic acid molecule using a concatamer primer that comprises a first region complementary to an end region of the population of substantially identical copies of the template nucleic acid molecule and a second region to generate a population of immobilized concatamer products of the substantially identical copies of the template nucleic acid molecule. | 02-26-2015 |
Patent application number | Description | Published |
20090105383 | Styrenated phenol ethoxylates in emulsion polymerization - The present invention relates to the use of Styrenated Phenol Ethoxylates as surfactants in emulsion polymerization. The present invention further relates to the use of both anionic and nonionic Styrenated Phenol Ethoxylates in emulsion polymerization. Latexes with small average particle and narrow particle size distributions are obtained. Prepared latexes also have low coagulum levels and exhibit excellent mechanical and chemical stability. | 04-23-2009 |
20120136118 | Styrenated phenol ethoxylates in emulsion polymerization - The present invention relates to the use of Styrenated Phenol Ethoxylates as surfactants in emulsion polymerization. The present invention further relates to the use of both anionic and nonionic Styrenated Phenol Ethoxylates in emulsion polymerization. Latexes with small average particle and narrow particle size distributions are obtained. Prepared latexes also have low coagulum levels and exhibit excellent mechanical and chemical stability. | 05-31-2012 |
20120136119 | Styrenated phenol ethoxylates in emulsion polymerization - The present invention relates to the use of Styrenated Phenol Ethoxylates as surfactants in emulsion polymerization. The present invention further relates to the use of both anionic and nonionic Styrenated Phenol Ethoxylates in emulsion polymerization. Latexes with small average particle and narrow particle size distributions are obtained. Prepared latexes also have low coagulum levels and exhibit excellent mechanical and chemical stability. | 05-31-2012 |
20140256852 | WATER BORNE EPOXY RESIN DISPERSIONS AND EPOXY HARDENER COMPOSITIONS - An epoxy or hardener mixture comprising (a) optionally water, (b) at least one hardener or epoxy resin, and (c) from 0.1 to 20 weight percent, based on epoxy resin of at least one distyryl phenol, tristyryl phenol or cumylphenol based additive surfactant with phosphate or sulfonate end groups having the structure R—OXn-W wherein R designates a polystyrylphenol or cumylphenol, preferentially chosen from among distyrylphenol, tristyrylphenol or cumylphenol, and mixtures thereof, and wherein OX designates ethylene oxide and/or propylene oxide. The number of groups “n” varies from 0 to 200, and W designates H, sulfate (—SO | 09-11-2014 |
Patent application number | Description | Published |
20090004089 | Silica gel manufacturing method and gels made thereby - New silica gel materials and novel methods of producing such are provided. The method itself entails a manner of mixing the reactants together in a one-pot process such that the time required for aging is reduced without compromising the ability to target pore size production. In such a way, the pH of the reaction drives pore size development, thereby permitting a more efficient process to be followed in terms of expensive drying/heating steps being reduced timewise, if not altogether. Furthermore, in one embodiment, the resultant gel materials exhibit a certain pore size minimum while simultaneously exhibiting a degree of softness heretofore unavailable. As such, not only is this novel method more efficient in silica gel manufacture, but the resultant materials are completely novel as well. The gel materials made therefrom may be utilized in a variety of different end uses, such as cooking oil filtration, soft skin cleansers, dental abrasives, and the like. Methods of production and use, as well as the novel gel materials themselves, particularly caustic and composite gels, are thus encompassed within this invention. | 01-01-2009 |
20090071895 | Caustic silica gel manufacturing method and gels made thereby - New silica gel materials and novel methods of producing such are provided. The method itself entails a manner of mixing the reactants together in a one-pot process such that the time required for aging is reduced without compromising the ability to target pore size production. In such a way, the pH of the reaction drives pore size development, thereby permitting a more efficient process to be followed in terms of expensive drying/heating steps being reduced timewise, if not altogether. Furthermore, in one embodiment, the resultant gel materials exhibit a certain pore size minimum while simultaneously exhibiting a degree of softness heretofore unavailable. As such, not only is this novel method more efficient in silica gel manufacture, but the resultant materials are completely novel as well. The gel materials made therefrom may be utilized in a variety of different end uses, such as cooking oil filtration, soft skin cleansers, dental abrasives, and the like. Methods of production and use, as well as the novel gel materials themselves, particularly caustic and composite gels, are thus encompassed within this invention. | 03-19-2009 |
Patent application number | Description | Published |
20130295667 | SERUM-FREE MAMMALIAN CELL CULTURE MEDIUM, AND USES THEREOF - The present invention provides a cell culture medium formulation that supports the in vitro cultivation, particularly in suspension, of mammalian cells, particularly epithelial cells and fibroblast cells, and methods for cultivating mammalian cells in suspension in vitro using these media. The media comprise a basal medium and a polyanionic or polyanionic compound, preferably a polysulfonated or polysulfated compound, and more preferably dextran sulfate. The present invention also provides chemically defined, protein-free eukaryotic cell culture media comprising an iron chelate and zinc, which is capable of supporting the growth (and particularly the high-density growth of mammalian cells) in suspension culture, increasing the level of expression of recombinant protein in cultured cells, and/or increasing virus production in cultured cells. | 11-07-2013 |
20150079659 | SERUM-FREE MAMMALIAN CELL CULTURE MEDIUM, AND USES THEREOF - The present invention provides a cell culture medium formulation that supports the in vitro cultivation, particularly in suspension, of mammalian cells, particularly epithelial cells and fibroblast cells, and methods for cultivating mammalian cells in suspension in vitro using these media. The media comprise a basal medium and a polyanionic or polyanionic compound, preferably a polysulfonated or polysulfated compound, and more preferably dextran sulfate. The present invention also provides chemically defined, protein-free eukaryotic cell culture media comprising an iron chelate and zinc, which is capable of supporting the growth (and particularly the high-density growth of mammalian cells) in suspension culture, increasing the level of expression of recombinant protein in cultured cells, and/or increasing virus production in cultured cells. | 03-19-2015 |
Patent application number | Description | Published |
20090280532 | SERUM-FREE MAMMALIAN CELL CULTURE MEDIUM, AND USES THEREOF - The present invention provides a cell culture medium formulation that supports the in vitro cultivation, particularly in suspension, of mammalian cells, particularly epithelial cells and fibroblast cells, and methods for cultivating mammalian cells in suspension in vitro using these media. The media comprise a basal medium and a polyanionic or polyanionic compound, preferably a polysulfonated or polysulfated compound, and more preferably dextran sulfate. The present invention also provides chemically defined, protein-free eukaryotic cell culture media comprising an iron chelate and zinc, which is capable of supporting the growth (and particularly the high-density growth of mammalian cells) in suspension culture, increasing the level of expression of recombinant protein in cultured cells, and/or increasing virus production in cultured cells. | 11-12-2009 |
20090280533 | SERUM-FREE MAMMALIAN CELL CULTURE MEDIUM, AND USES THEREOF - The present invention provides a cell culture medium formulation that supports the in vitro cultivation, particularly in suspension, of mammalian cells, particularly epithelial cells and fibroblast cells, and methods for cultivating mammalian cells in suspension in vitro using these media. The media comprise a basal medium and a polyanionic or polyanionic compound, preferably a polysulfonated or polysulfated compound, and more preferably dextran sulfate. The present invention also provides chemically defined, protein-free eukaryotic cell culture media comprising an iron chelate and zinc, which is capable of supporting the growth (and particularly the high-density growth of mammalian cells) in suspension culture, increasing the level of expression of recombinant protein in cultured cells, and/or increasing virus production in cultured cells. | 11-12-2009 |
Patent application number | Description | Published |
20100287620 | COMPUTER SYSTEM LOCK-DOWN - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, a method is provided for locking down a computer system. A customized, local whitelist database is stored with a memory of the computer system. The whitelist database forms a part of an authentication system operable within the computer system and contains therein cryptographic hash values of code modules expressly approved for execution by the computer system. A kernel mode driver of the authentication system intercepts a request to create a process associated with a code module. The authentication system determines whether to authorize the request by causing a cryptographic hash value of the code module to be authenticated against the whitelist database. The authentication system allows the code module to be loaded and executed within the computer system if the cryptographic hash value matches one of the cryptographic hash values. | 11-11-2010 |
20110029772 | CLOUD-BASED APPLICATION WHITELISTING - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, an in-memory cache is maintained having entries containing execution authorization information regarding recently used modules. After authenticating a module, its execution authorization information is added to the cache. Activity relating to a module is intercepted. A hash value of the module is generated. The module is authenticated with reference to a multi-level whitelist including a global whitelist, a local whitelist and the cache. The authentication includes first consulting the cache and if the module is not found, then looking up its hash value in the local whitelist and if it is not found, then looking it up in the global whitelist. Finally, the module is allowed to be loaded and executed if its hash value matches a hash value of an approved code modules within the global whitelist. | 02-03-2011 |
20110167050 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, file or operating system activity relating to a code module is intercepted. A cryptographic hash value of the code module is authenticated with reference to a multi-level whitelist, which includes a remote global whitelist and a local whitelist. The remote global whitelist is maintained by a trusted service provider and contains cryptographic hash values of approved code modules known not to contain malicious code. The local whitelist is accessible by computer systems within the LAN and contains cryptographic hash values of a subset of the approved code modules. The cryptographic hash value is checked against the local whitelist. If no match is found, it is checked against the global whitelist. The code module is allowed to be loaded and executed if the cryptographic hash value corresponds to an approved code module. | 07-07-2011 |
20110167259 | SOFTWARE LICENSE ENFORCEMENT - Systems and methods for performing software license enforcement are provided. According to one embodiment, file or operating system activity relating to a code module are intercepted by a kernel mode driver of a computer system. The kernel mode driver causes a cryptographic hash value of the code module to be authenticated with reference to a local whitelist containing cryptographic hash values of approved code modules known not to contain malicious code. The local whitelist also contains licensing control information. If the cryptographic hash value matches a cryptographic hash value of an approved code module, then (i) authority to execute the code module is further validated if the licensing control information so indicates by performing a license check regarding the code module; and (ii) the code module is allowed to be loaded and executed within the computer system if the authority is affirmed by the license check. | 07-07-2011 |
20110167260 | COMPUTER SYSTEM LOCK-DOWN - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, a method is provided for locking down a computer system. A customized, local whitelist database is stored with a memory of the computer system. The whitelist database forms a part of an authentication system operable within the computer system and contains therein cryptographic hash values of code modules expressly approved for execution by the computer system. A kernel mode driver of the authentication system intercepts file system or operating system activity relating to a code module. The authentication system determines whether to authorize the request by causing a cryptographic hash value of the code module to be authenticated against the whitelist database. The authentication system allows the code module to be loaded and executed within the computer system if the cryptographic hash value matches one of the cryptographic hash values. | 07-07-2011 |
20110167261 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, file system or operating system activity relating to a first code module is initiated by a running process associated with a second code module. The file system or operating system activity is intercepted by a kernel mode driver of a computer system. The kernel mode driver selectively authorizes loading of the first code module by the running process based at least in part on one or more attributes of the second code module. | 07-07-2011 |
20120072725 | CLOUD-BASED APPLICATION WHITELISTING - Systems and methods for allowing authorized code to execute on a computer system are provided. According to one embodiment, an in-memory cache is maintained having entries containing execution authorization information regarding recently used modules. After verifying a module, its execution authorization information is added to the cache. Activity relating to a module is intercepted. A hash value of the module is generated. The module is verified with reference to a multi-level whitelist including a global whitelist, a local whitelist and the cache. The verification includes first consulting the cache and if the module is not found, then looking up its hash value in the local whitelist and if it is not found, then looking it up in the global whitelist. Finally, the module is allowed to be executed if the code module is approved by the multi-level whitelist database architecture. | 03-22-2012 |
20120078863 | APPLICATION CONTROL CONSTRAINT ENFORCEMENT - Systems and methods for performing application control constraint enforcement are provided. According to one embodiment, file system or operating system activity of a computer system is intercepted relating to a code module. A cryptographic hash value of the code module is checked against a local whitelist database containing cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code. The local whitelist database also contains execution constraint information. When the cryptographic hash value matches one of the cryptographic hash values of approved code modules, authority of the computer system or an end user of the computer system to execute the code module is further validated if the execution constraint information so indicates by performing a constraint check regarding the code module. If the authority is affirmed by the constraint check, then allowing the code module to be executed. | 03-29-2012 |
20120191972 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, a kernel mode driver of a computer system intercepts file system or operating system activity, by a running process, relating to a dependent code module. Loading of the dependent code module is selectively authorized by authenticating a cryptographic hash value of the dependent code module with reference to a multi-level whitelist. The multi-level whitelist includes a global whitelist database remote from the computer system, maintained by a trusted service provider and which contains cryptographic hash values of approved code modules known not to contain viruses or malicious code; and a local whitelist database that includes cryptographic hash values of a subset of the approved code modules. The running process is allowed to load the dependent code module when the cryptographic hash value matches one of the cryptographic hash values of the approved code modules. | 07-26-2012 |
20130297946 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an active process, a real-time authentication process is performed or bypassed on a code module to which the monitored event relates with reference to a multi-level whitelist. The multi-level whitelist includes a global whitelist database remote from the computer system, maintained by a trusted service provider and which contains cryptographic hash values of approved code modules; and a local whitelist database that includes cryptographic hash values of a subset of the approved code modules. The active process is allowed to load the code module when the authentication process is bypassed or when the cryptographic hash value of the code module matches one of the cryptographic hash values of approved code modules within the multi-level whitelist. | 11-07-2013 |
20140075187 | SELECTIVE AUTHORIZATION OF THE LOADING OF DEPENDENT CODE MODULES BY RUNNING PROCESSES - Systems and methods for selective authorization of dependent code modules are provided. According to one embodiment, responsive to a monitored file system or operating system event initiated by an active process, a real-time authentication process is performed or bypassed on a code module to which the monitored event relates with reference to a whitelist that includes cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code. The active process is allowed to load the code module when the authentication process is bypassed or when the cryptographic hash value of the code module matches one of the cryptographic hash values of approved code modules within the whitelist. | 03-13-2014 |
20140082355 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, a whitelist containing cryptographic hash values of code modules that are approved for loading into memory of a computer system and execution on the computer system is maintained by a kernel mode driver of the computer system. At least a subset of the cryptographic hash values has been included within the whitelist based upon results of application of one or more behavior analysis techniques to a corresponding subset of code modules. The kernel mode driver monitors a set of events occurring within one or more of a file system accessible by the computer system and an operating system that manages resources of the computer system. The kernel mode driver causes a cryptographic hash value of a code module relating to an observed event of the set of events to be authenticated with reference to the whitelist. When the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the whitelist, the code module is allowed to be loaded and executed within the computer system. | 03-20-2014 |
20140115323 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, a trusted service provider maintain a cloud-based whitelist containing cryptographic hash values including those of code modules that are approved for execution on computer systems of subscribers of the service provider. A code module information query, including a cryptographic hash value of a code module, is received from a computer system of a subscriber by the service provider. If the cryptographic hash value matches one the cryptographic hash values contained within the cloud-based whitelist and the code module is an approved code module, then the service provider responds with an indication that the code module is authorized for execution; otherwise, it (i) responds with an indication that the code module is an unknown code module; and (ii) causes one or more behavior analysis techniques to be performed on the code module. | 04-24-2014 |
20140181511 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by authenticating a cryptographic hash value of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that is maintained by a trusted service provider and that contains cryptographic hash values of approved code modules, which are known not to contain viruses or malicious code and (ii) a local whitelist database containing cryptographic hash values of at least a subset of the approved code modules. The activity relating to the code module is allowed when the cryptographic hash value matches one of the cryptographic hash values of approved code modules within the multi-level whitelist. | 06-26-2014 |
20150026463 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, file system or operating system activity relating to a code module is intercepted by a kernel mode driver of a computer system. The code module is selectively authorized by the kernel mode driver by authenticating a content authenticator of the code module with reference to a multi-level whitelist. The multi-level whitelist includes (i) a global whitelist database remote from the computer system that contains content authenticators of approved code modules that are known not to contain viruses or malicious code and (ii) a local whitelist database containing content authenticators of at least a subset of the approved code modules. The activity relating to the code module is allowed when the content authenticator matches one of the content authenticators of approved code modules within the multi-level whitelist. | 01-22-2015 |
20150193614 | SECURE SYSTEM FOR ALLOWING THE EXECUTION OF AUTHORIZED COMPUTER PROGRAM CODE - Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel mode driver monitors events occurring within a file system or an operating system. Responsive to observation of a trigger event performed by or initiated by an active process, in which the active process corresponds to a first code module within the file system and the event relates to a second code module within the file system, performing or bypassing a real-time authentication process on the second code module with reference to a whitelist containing content authenticators of approved code modules, which are known not to contain viruses or malicious code. The active process is allowed to load the second code module into memory when the real-time authentication process is bypassed or when it is performed and determines a content authenticator of the code module matches one of the content authenticators. | 07-09-2015 |