Patents by Inventor Alice Lee
Alice Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8357684Abstract: Thiazolopyridin-2-yloxy-phenyl and thiazolopyrazin-2-yloxy-phenyl amine compounds are described, which are useful as LTA4 hydrolase (LTA4H) modulators. Such compounds may be used in pharmaceutical compositions and methods for modulation of LTA4H and for the treatment of disease states, disorders, and conditions mediated by LTA4 hydrolase activity.Type: GrantFiled: March 2, 2011Date of Patent: January 22, 2013Assignee: Janssen Pharmaceutica NVInventors: Genesis M. Bacani, Eugene Y. Cheung, Christa C. Chrovian, Laurent Gomez, Cheryl A. Grice, Aaron M. Kearney, Adrienne M. Landry-Bayle, Alice Lee-Dutra, Alejandro Santillán, Jr., Kathleen Sappey, Kia Sepassi, Virginia M. Tanis, Alvah T. Wickboldt, John J. M. Wiener
-
Patent number: 8347350Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: February 10, 2012Date of Patent: January 1, 2013Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8347351Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 14, 2012Date of Patent: January 1, 2013Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8344008Abstract: Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A4 hydrolase (LTA4H or LTA4H) modulation and for the treatment of disease states, disorders, and conditions mediated by LTA4H activity, such as allergy, asthma, autoimmune diseases, pruritis, inflammatory bowel disease, ulcerative colitis, and cardiovascular disease, including atherosclerosis and prevention of myocardial infarction.Type: GrantFiled: April 21, 2011Date of Patent: January 1, 2013Assignee: Janssen Pharmaceutica NVInventors: Genesis M. Bacani, Scott D. Bembenek, Wendy Eccles, James P. Edwards, Matthew T. Epperson, Laurent Gomez, Cheryl A. Grice, Aaron M. Kearney, Adrienne M. Landry-Bayle, Alice Lee-Dutra, Kelly J. McClure, Taraneh Mirzadegan, Alexandro Santillán, Jr.
-
Patent number: 8283126Abstract: A composition of matter suitable for use in identifying chemical compounds that bind to voltage-dependent ion channel proteins, the composition comprising a screening protein that comprises an ion channel voltage sensor domain of the ion channel protein immobilized on a solid support.Type: GrantFiled: December 16, 2010Date of Patent: October 9, 2012Assignee: The Rockefeller UniversityInventors: Roderick MacKinnon, Alice Lee MacKinnon, Youxing Jiang, Vanessa Ruta
-
Publication number: 20120254939Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254938Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120254937Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: October 4, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120246698Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 14, 2012Publication date: September 27, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20120201809Abstract: The present invention relates to Multifunctional Antibody Conjugates, comprising an antibody or antigen binding portion thereof, comprising at least a fragment of a light chain constant kappa region (CL?) comprising K188 according to Kabat numbering; a linker comprising the formula X-Y-Z, wherein Z is a group is covalently connected to the antibody through the side chain of K188, Y is a linear or branched biologically compatible connecting chain, and X is a group covalently connected to at least one Effector Moiety. The invention further provides specific MAC compounds and compositions of the invention.Type: ApplicationFiled: November 28, 2011Publication date: August 9, 2012Applicant: COVX TECHNOLOGIES IRELAND, LIMITEDInventors: Abhijit Suresh Bhat, Curt William Bradshaw, Olivier Alexandre Laurent, Alice Lee, Richard Ryan Preston, David Tumelty, Lauren Diane Wood, Wei Hong Yu
-
Publication number: 20120131637Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: February 10, 2012Publication date: May 24, 2012Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8117645Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: February 14, 2012Assignee: Infoexpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8112788Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: February 7, 2012Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8108909Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: June 10, 2011Date of Patent: January 31, 2012Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Patent number: 8051460Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: GrantFiled: November 18, 2008Date of Patent: November 1, 2011Assignee: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110263639Abstract: Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A4 hydrolase (LTA4H or LTA4H) modulation and for the treatment of disease states, disorders, and conditions mediated by LTA4H activity, such as allergy, asthma, autoimmune diseases, pruritis, inflammatory bowel disease, ulcerative colitis, and cardiovascular disease, including atherosclerosis and prevention of myocardial infarction.Type: ApplicationFiled: April 21, 2011Publication date: October 27, 2011Inventors: Genesis M. Bacani, Scott D. Bembenek, Wendy Eccles, James P. Edwards, Matthew T. Epperson, Laurent Gomez, Cheryl A. Grice, Aaron M. Kearney, Adrienne M. Landry-Bayle, Alice Lee-Dutra, Kelly J. McClure, Taraneh Mirzadegan, Alejandro Santillán, JR.
-
Publication number: 20110257153Abstract: Aryl-substituted bridged or fused diamine compounds, pharmaceutical compositions containing them, and methods of using the compounds and the pharmaceutical compositions for leukotriene A4 hydrolase (LTA4H or LTA4H) modulation and for the treatment of disease states, disorders, and conditions mediated by LTA4H activity, such as allergy, asthma, autoimmune diseases, pruritis, inflammatory bowel disease, ulcerative colitis, and cardiovascular disease, including atherosclerosis and prevention of myocardial infarction.Type: ApplicationFiled: April 21, 2011Publication date: October 20, 2011Inventors: Genesis M. Bacani, Scott D. Bembenek, Wendy Eccles, James P. Edwards, Matthew T. Epperson, Laurent Gomez, Cheryl A. Grice, Aaron M. Kearney, Adrienne M. Landry-Bayle, Alice Lee-Dutra, Kelly J. Mcclure, Taraneh Mirzadegan, Alexandro Santillan, JR.
-
Publication number: 20110231915Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231916Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee
-
Publication number: 20110231928Abstract: A new approach to network security includes manipulating an access point such that an initial communication from an external device is passed to a restricted subset of a computing network including a gatekeeper. The gatekeeper is configured to enforce a security policy against the external device before granting access to a less-restricted subset of the computing network. If requirements of the security policy are satisfied, then the gatekeeper reconfigures the access point such that further communication from the external device may be received by elements of the less-restricted subset. Enforcement of the security policy optionally includes performing a security audit of the external device.Type: ApplicationFiled: June 10, 2011Publication date: September 22, 2011Applicant: InfoExpress, Inc.Inventors: Stacey C. Lum, Yuhshiow Alice Lee