Stoecklin, CH
Elisabeth Stoecklin, Basel CH
Patent application number | Description | Published |
---|---|---|
20130252927 | TREATING CONDITIONS ASSOCIATED WITH INCREASED EOTAXIN WITH 25-HYDROXYVITAMIN D3 - The present invention relates to treating/preventing conditions associated with an increased level of eotaxin in a human with 25-hydroxyvitamin D3 (calcifediol). Optionally, vitamin D3 may be used together with 25-hydroxyvitamin D3. | 09-26-2013 |
Elisabeth Stoecklin, Arlesheim CH
Patent application number | Description | Published |
---|---|---|
20110039809 | COMBINED USE OF 25-HYDROXY-VITAMIN D3 AND VITAMIN D3 FOR IMPROVING BONE MINERAL DENSITY AND FOR TREATING OSTEOPORISIS - We disclose the combined use of vitamin D (cholecalciferol) and 25-OH D3 (calcifediol) to treat and/or prevent osteoporosis. One or more bisphosphonate compounds to inhibit bone resorption may also be used. Forms and dosages of a pharmaceutical composition, as well as processes for manufacturing medicaments, are also disclosed. | 02-17-2011 |
20110052707 | COMBINATION OF VITAMIN D AND 25-HYDROXYVITAMIN D 3 - We disclose compositions comprising Vitamin D (cholecalciferol and/or ergocalciferol) and 25-OH D3 (calcifediol), and use of those compositions to affect at least concentration, bioavailability, metabolism, or efficacy of vitamin D in a human. Forms and dosages of the composition, as well as processes for manufacturing a spray-dried formulation, are also disclosed. | 03-03-2011 |
20110118218 | TREATING HYPERTENSION WITH 25-HYDROXYVITAMIN D3 - We disclose the use of optionally in combination with vitamin D3 (cholecalciferol), 25-hydroxyvitamin D3 (cal-cifediol), to treat hypertension. Forms and dosages of a pharmaceutical composition, as well as processes for manufacturing medicaments, are also disclosed. | 05-19-2011 |
20120196057 | COMBINATION OF VITAMIN D AND 25-HYDROXYVITAMIN D 3 - We disclose compositions comprising Vitamin D (cholecalciferol and/or ergocalciferol) and 25-OH D3 (calcifediol), and use of those compositions to affect at least concentration, bioavailability, metabolism, or efficacy of vitamin D in a human. Forms and dosages of the composition, as well as processes for manufacturing a spray-dried formulation, are also disclosed. | 08-02-2012 |
20130150598 | USE OF 25-HYDROXY-VITAMIN D3 TO AFFECT HUMAN MUSCLE PHYSIOLOGY - The use of 25-OH D3 (calcifediol) to increase muscle strength, muscle function, or both is provided. Vitamin D3 (cholecalciferol) may optionally be used together with 25-OH D3. Forms and dosages of a pharmaceutical composition, as well as processes for manufacturing medicaments, are also disclosed. | 06-13-2013 |
20130210782 | TREATING HYPERGLYCEMIA WITH 25-HYDROXYVITAMIN D3 - We disclose treating hyperglycemia in a human with 25-hydroxyyitamin D3 (calcifediol). Blood glucose is reduced to a level which is closer to normal than baseline. Vitamin D3 (cholecalciferol) may optionally be used together with 25-hydroxy vitamin D3. Forms and dosages of a pharmaceutical composition, as well as processes for manufacturing medicaments, are also disclosed. | 08-15-2013 |
Elizabeth Stoecklin, Arlesheim CH
Patent application number | Description | Published |
---|---|---|
20110039810 | USE OF 25-HYDROXY-VITAMIN D3 TO AFFECT HUMAN MUSCLE PHYSIOLOGY - We disclose the use of 25-OH D3 (calcifediol) to increase muscle strength, muscle function, or both. Vitamin D3 (cholecalciferol) may optionally be used together with 25-OH D3. Forms and dosages of a pharmaceutical composition, as well as processes for manufacturing medicaments, are also disclosed. | 02-17-2011 |
20110039811 | TREATING HYPERGLYCEMIA WITH 25-HYDROXYVITAMIN D3 - We disclose treating hyperglycemia in a human with 25-hydroxyvitamin D3 (calcifediol). Blood glucose is reduced to a level which is closer to normal than baseline. Vitamin D3 (cholecalciferol) may optionally be used together with 25-hydroxy vitamin D3. Forms and dosages of a pharmaceutical composition, as well as processes for manufacturing medicaments, are also disclosed. | 02-17-2011 |
Marc Stoecklin, Bern CH
Patent application number | Description | Published |
---|---|---|
20150264077 | Computer Implemented Techniques for Detecting, Investigating and Remediating Security Violations to IT Infrastructure - A method includes collecting system calls and call parameters invoked by monitored applications for target computer systems. The system calls and call parameters are received from operating system kernels on the plurality of target computer systems. Sequences of systems calls and call parameters of the monitored applications are correlated among different target computer systems to deduce malicious activities. Remedial action(s) are performed in response to malicious activities being deduced as being malicious by the correlating. Another method includes determining that network activity at a specific time is deemed to be suspicious. Using IP addresses involved in the suspicious network activity, computer system(s) are determined that are sources of the suspicious network activity. Based on the specific time and the determined computer system(s), application(s) are determined that are executing on the determined computer system(s) that are causing the suspicious network activity. Remedial action(s) are performed for the determined computer system(s). | 09-17-2015 |
Marc Stoecklin, Basel CH
Patent application number | Description | Published |
---|---|---|
20100049700 | Probabilistic Lossy Counting - A method for probabilistic lossy counting includes: for each element in a current window, determining whether an entry corresponding to a current element is present in a table; in the event an entry corresponding to the current element is present in the table, incrementing a frequency counter associated with the current element; otherwise, inserting an entry into a table, wherein inserting an entry comprises: calculating a probabilistic error bound Δ based on an index i of the current window; and inserting the probabilistic error bound Δ and a frequency counter into an entry corresponding to the current element in the table; and at the end of the current window, removing all elements from the table wherein the sum of the frequency counter and probabilistic error bound Δ associated with the element is less than or equal to the index of the current window. | 02-25-2010 |
20100054151 | SYSTEM AND METHOD FOR NETWORK FLOW TRAFFIC RATE ENCODING - A system and method for monitoring packetized traffic flow in a network and enabling approximation of the rate information of a network flow. The method for monitoring network traffic flow includes receiving, at a network packet flow collector device, packetized traffic flow signals to be monitored; sampling said received packetized traffic flow signals in time to form an approximation of the packet flow rate in time; generating packet flow activity data comprising data representing the sampled traffic flow signals sampled in time; communicating the packet flow activity data to a network packet flow analyzer device and processing the flow activity data to form signals representing an approximate version of the network traffic flow in the network, the analyzer processing the traffic flow signals for reconstructing the rate of the netflow as a function of time. The flow analyzer then generates a compressed version of the network traffic flow signals in the network, the compressed network traffic flow signals comprising relevant approximation of the packet flow rate in time. | 03-04-2010 |
Marc P. Stoecklin, Bern CH
Patent application number | Description | Published |
---|---|---|
20150326594 | NETWORK DATA COLLECTION AND RESPONSE SYSTEM - Embodiments include a network data collection and response system for enhancing security in an enterprise network providing a user-supplied computing device with access to the network. A network data collection and response system tracks network activity of the device and maintains a device inventory recording the device type and configuration information for the device along with a resource utilization profile for the device. The network data collection and response system detects high-risk or unauthorized network activity involving the device through passive monitoring without utilization of a data monitoring agent installed on the device and implements a response action to mitigate the high-risk or unauthorized network. | 11-12-2015 |
Marc P. Stoecklin, Basel CH
Patent application number | Description | Published |
---|---|---|
20090177768 | SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR EXTRACTING PORT-LEVEL INFORMATION OF WEB SERVICES WITH FLOW-BASED NETWORK MONITORING - Systems, methods, and computer program products for extracting port-level information of Web services with flow-based network monitoring. Exemplary embodiments include a method for extracting port-level information of Web services with flow-based network monitoring, the method including identifying a registry machine, coupling the registry machine to a traffic meter and flow monitor dynamically configuring the traffic meter, including exporting a first n bytes of a traffic payload exporting a sub-second traffic flow start and end times, extracting service provider information from traffic flow exports, including analyzing the exported n bytes of the traffic payload to extract port-level information at the flow monitor, extracting a value of an access point element, mapping a logical service provider address to a physical address and inserting the service into a Web Service Provider Registry within the flow meter, thereby populating the Web Service Provider Registry. | 07-09-2009 |
Marc Ph. Stoecklin, Bern CH
Patent application number | Description | Published |
---|---|---|
20140310396 | IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS - The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information. | 10-16-2014 |
20140310517 | IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS - The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information. | 10-16-2014 |
20150295805 | IDENTIFICATION AND CLASSIFICATION OF WEB TRAFFIC INSIDE ENCRYPTED NETWORK TUNNELS - The present principles are directed to identifying and classifying web traffic inside encrypted network tunnels. A method includes analyzing network traffic of unencrypted data packets to detect packet traffic, timing, and size patterns. The detected packet, timing, and size traffic patterns are correlated to at least a packet destination and a packet source of the unencrypted data packets to create at least one of a training corpus and a model built from the training corpus. The at least one of the corpus and model is stored in a memory device. Packet traffic, timing, and size patterns of encrypted data packets are observed. The observed packet traffic, timing, and size patterns of the encrypted data packets are compared to at least one of the training corpus and the model to classify the encrypted data packets with respect to at least one of a predicted network host and predicted path information. | 10-15-2015 |
Marc Ph. Stoecklin, Basel CH
Patent application number | Description | Published |
---|---|---|
20090245109 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR DETECTING FLOW-LEVEL NETWORK TRAFFIC ANOMALIES VIA ABSTRACTION LEVELS - Methods, systems and computer program products for detecting flow-level network traffic anomalies via abstraction levels. An exemplary embodiment includes a method for detecting flow-level network traffic anomalies in a computer network, the method including obtaining current distributions of flow level traffic features within the computer network, computing distances of the current distributions' components from a distributions model, comparing the distances of the current distributions to distance baselines from the distributions model, determining if the distances are above a pre-determined thresholds and in response to one or more of the distances being above the pre-determined thresholds in one or more distributions, identifying the current condition to be abnormal and providing indications to its nature. | 10-01-2009 |