Patents by Inventor Peter Birk
Peter Birk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20090209430Abstract: The present invention provides a method for combining the advantages of encoded molecule fragments made by split and mix synthesis with the advantages of template directed synthesis of molecules.Type: ApplicationFiled: November 22, 2005Publication date: August 20, 2009Inventor: Peter Birk Rasmussen
-
Publication number: 20090092579Abstract: Disclosed are novel methods for combating diseases characterized by deposition of amyloid. The methods generally rely on immunization against amyloidogenic proteins (proteins contributing to formation of amyloid) such as beta amyloid (A?). Immunization is preferably effected by administration of analogues of autologous amyloidogenic polypeptides, said analogues being capable of inducing antibody production against the autologous amyloidogenic polypeptides. Especially preferred as an immunogen is autologous A? which has been modified by introduction of one single or a few foreign, immunodominant and promiscuous T-cell epitopes while substantially preserving the majority of A?'s B-cell epitopes. Also disclosed are nucleic acid vaccination against amyloidogenic polypeptides and vaccination using live vaccines as well as methods and means useful for the vaccination.Type: ApplicationFiled: April 23, 2008Publication date: April 9, 2009Applicant: Pharmexa A/SInventors: Martin Roland Jensen, Peter Birk, Klaus Gregorius Nielsen
-
Publication number: 20080267990Abstract: The present invention is based on the identification and characterization of a number of novel M. tuberculosis derived proteins and protein fragments. The invention is directed to the polypeptides and immunologically active fragments thereof, the genes encoding them, immunological compositions such as diagnostic reagents containing the polypeptides.Type: ApplicationFiled: November 1, 2007Publication date: October 30, 2008Applicant: STATENS SERUM INSTITUTInventors: Peter Andersen, Karin Weldingh, Christina Veggerby Hansen, Walter Florio, Li Mei Meng Okkels, Rikke Louise Vinther Skjot, Peter Birk Rasmussen
-
Publication number: 20080034202Abstract: A method and apparatus for preventing rogue implementations of a security-sensitive class interface are provided. With the method and apparatus, a unique identifier (UID) is created by a server process when the server process is started. Anytime the server process, i.e. a server runtime environment, instantiates a new credential object following start-up of the server process, the encrypted UID is placed into a private field within the new credential object. In addition, the UID is encrypted and stored in a private class of the server runtime environment. A verification class is provided within the server runtime environment which includes one or more methods that receive the credential object as a parameter and return true or false as to the validity of the credential object.Type: ApplicationFiled: October 4, 2007Publication date: February 7, 2008Inventors: Peter Birk, Ching-Yun Chao, Hyen Chung
-
Publication number: 20070295491Abstract: A device for exchanging heat comprising at least one fluid inlet (2), at least one header pipe (4), a plurality of flat pipes (5) at least at one end being in flow connection with the header pipe (4), a fluid outlet (9) and at least one frame element (21, 23) being in connection with the header pipe (4) wherein said connection between the frame element (21, 23) and the header pipe (4) is a frictional connection due to auxiliary equipment (33).Type: ApplicationFiled: June 23, 2006Publication date: December 27, 2007Applicant: Behr America, Inc.Inventors: Olaf Neumann, Peter Birk
-
Publication number: 20070192632Abstract: The present invention relates to a secure caching technique for shared distributed caches. A method in accordance with an embodiment of the present invention includes: encrypting a key K to provide a secure key, the key K corresponding to a value to be stored in a cache; and storing the value in the cache using the secure key.Type: ApplicationFiled: February 6, 2006Publication date: August 16, 2007Applicant: International Business Machines CorporationInventors: Keys Botzum, Peter Birk
-
Patent number: 7135181Abstract: A method for in vivo down-regulation of amyloid protein in an animal, including a human being, the method comprising effecting presentation to the animal's immune system of an immunogenically effective amount of at least one amyloidogenic polypeptide or subsequence thereof which has been formulated so that immunization of the animal with the amyloidgenic polypeptide or subsequence thereof induces production of antibodies against the amyloidogenic polypeptide, and/or at least one analogue of the amyloidogenic polypeptide wherein is introduced at least one modification in the amino acid sequence of the amyloidogenic polypeptide which has as a result the immunization of the animal with the analogue induces production of antibodies against the amyloidogenic polypeptide.Type: GrantFiled: February 20, 2001Date of Patent: November 14, 2006Assignee: Pharmexa A/SInventors: Martin Roland Jensen, Peter Birk Rasmussen, Klaus Gregorius Nielsen
-
Patent number: 7037510Abstract: The present invention discloses fusion proteins of the immunodominant antigens ESAT-6 and Ag85B from Mycobacterium tuberculosis or homologues thereof, and a tuberculosis vaccine based on the fusion proteins, which vaccine induces efficient immunological memory.Type: GrantFiled: March 13, 2001Date of Patent: May 2, 2006Assignee: Statens Serum InstitutInventors: Peter Andersen, Anja Weinreich Olsen, Rikke Louise Vinther Skjøt, Peter Birk Rasmussen
-
Patent number: 7005498Abstract: A method is disclosed for inducing cell-mediated immunity against cellular antigens. More specifically, the invention provides for a method for inducing cytotoxic T-lymphocyte immunity against weak antigens, notably self-proteins. The method entails that antigen presenting cells are induced to present at least one CTL epitope of the weak antigen and at the same time presenting at least one foreign T-helper lymphocyte epitope. In a preferred embodiment, the antigen is a cancer specific antigen, e.g. PSM, Her2, or FGF8b. The method can be exercised by using traditional polypeptide vaccination, but also by using live attenuated vaccines or nucleic acid vaccination. The invention furthermore provides immunogenic analogues of PSM, Her2 and FGF8b, as well as nucleic acid molecules encoding these analogues. Also vectors and transformed cells are disclosed. The invention also provides for a method for identification of immunogenic analogues of weak or non-immunogenic antigens.Type: GrantFiled: October 5, 1999Date of Patent: February 28, 2006Assignee: Pharmexa A/sInventors: Lucilla Steinaa, Søren Mouritsen, Anand Gautam, Iben Dalum, Jesper Hanning, Dana Leach, Klaus Gregorius Nielsen, Gunilla Karlsson, Peter Birk Rasmussen
-
Publication number: 20060020813Abstract: A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code.Type: ApplicationFiled: June 30, 2004Publication date: January 26, 2006Applicant: International Business Machines CorporationInventors: Peter Birk, Ching-Yun Chao, Hyen Chung
-
Publication number: 20060021016Abstract: A method, apparatus and computer instructions for tracking security attributes along invocation chain using secure propagation token. When a user is authenticated, a propagation token is created. The propagation token includes a caller list, a host list, and custom attributes. The propagation token may be propagated downstream along with other marker tokens. A service provider may associate custom attributes in the propagation token or create custom propagation token to be propagated. The propagation token tracks the original caller and subsequent callers when user switches occur and a list of hosts at which the propagation token lands on.Type: ApplicationFiled: June 30, 2004Publication date: January 26, 2006Applicant: International Business Machines CorporationInventors: Peter Birk, Keys Botzum, Ching Chao, Hyen-Vui Chung
-
Publication number: 20060015727Abstract: An extensible token framework is provided for identifying purpose and behavior of run time security objects. The framework includes a set of marker token interfaces, which extends from a default token interface. A service provider may implement one or more marker token interfaces for a Subject or a thread of execution. A service provider may also implement its own custom marker tokens to perform custom operations. The security infrastructure runtime recognizes behavior and purpose of run time security objects based on the marker or custom marker token interfaces the token implements and handles the security objects accordingly.Type: ApplicationFiled: June 30, 2004Publication date: January 19, 2006Applicant: International Business Machines CorporationInventors: Peter Birk, Ching-Yun Chao, Hyen Chung
-
Publication number: 20060005234Abstract: A method, apparatus and computer instructions for handling propagation of custom tokens without using Java™ serialization. A service provider may plug in a first login module to add a marker token to a subject for later use by an application at run time. The marker token is then serialized by the mechanism of the present invention by invoking a get bytes method on the token. The present invention then propagates the token downstream if the token is marked forwardable. At a target server, a second login module may be plugged in to deserialize a byte array from a list of tokens and perform custom operation on the byte array retrieved from a token holder.Type: ApplicationFiled: June 30, 2004Publication date: January 5, 2006Applicant: International Business Machines CorporationInventors: Peter Birk, Ching-Yun Chao, Hyen Chung
-
Patent number: 6982085Abstract: The present invention is based on the identification and characterization of a number of novel M. tuberculosis derived proteins and protein fragments. The invention is directed to the polypeptides and immunologically active fragments thereof, the genes encoding them, immunological compositions such as diagnostic reagents containing the polypeptides.Type: GrantFiled: May 2, 2002Date of Patent: January 3, 2006Assignee: Statens Serum InstitutInventors: Peter Andersen, Karin Weldingh, Christina Veggerby Hansen, Walter Florio, Li Mei Meng Okkels, Rikke Louise Vinther Skjot, Peter Birk Rasmussen
-
Publication number: 20050278790Abstract: A system and method is provided for reducing the complexity and improving the performance of enforcing security restrictions on the execution of program code in a runtime environment. In a preferred embodiment, units of executable code, such as methods or functions, are classified by “security level.” Code units belonging to a “trusted” security level may call any other code unit in the runtime environment, but other security levels are restricted in the code units they can call. In a preferred embodiment, the security levels are represented by corresponding permission objects. Each permission object that is associated with a particular security level includes a numerical value that denotes that security level. Security policies can be enforced with respect to caller and callee code units by comparing numerical values of corresponding permission objects. This security level scheme also improves runtime performance by making it unnecessary to check individually-defined permissions in many cases.Type: ApplicationFiled: June 10, 2004Publication date: December 15, 2005Applicant: International Business Machines CorporationInventors: Peter Birk, Ching-Yun Chao
-
Publication number: 20050154887Abstract: State management (cookie) data is encrypted so that access control data included in the cookie is unable to be modified by the user. A hashing algorithm is performed using various fields in the cookie data and the hash value is encrypted. The hash value is combined with other data such as the user identifier and a time stamp and encrypted to form a cookie value. When a request is received, the cookie data is checked. If the token value is not in the server's cache then the token is authenticated facilitating movement of the client between servers. If the cookie does not exist or is timed out, then the user is authenticated using traditional means.Type: ApplicationFiled: January 12, 2004Publication date: July 14, 2005Applicant: International Business Machines CorporationInventors: Peter Birk, Ching-Yun Chao, Hyen Chung, Carlton Mason, Karkala Reddy, Vishwanath Venkataramappa, Dennis Riddlemoser
-
Publication number: 20050154886Abstract: A method and system for providing a declarative trust association model that formalizes the way trust is established and requires corresponding authentication information to be presented in a standard format. Consequently, the application server may provide a guaranteed level of protection. The mechanism of the present invention provides a framework that allows an application server to enforce a trust evaluation and allows reverse proxy security server to assert a client's security identity, as well as other client security credential information. A known trust association interceptor model is extended to allow the reverse proxy security server to assert the authenticated user's security attributes. Such security attributes include, for example, group information, authentication strength, and location (i.e., where does the user enter the request, intranet vs. internet, IP address, etc.,). The security attributes can be used in making authorization decisions.Type: ApplicationFiled: January 12, 2004Publication date: July 14, 2005Applicant: International Business Machines CorporationInventors: Peter Birk, Ching-Yun Chao, Hyen Chung, Ajay Karkala, Carlton Mason, Nataraj Nagaratnam, Brian Smith, Vishwanath Venkataramappa
-
Publication number: 20040141958Abstract: A method is disclosed for inducing cell-mediated immunity against cellular antigens. More specifically, the invention provides for a method for inducing cytotoxic T-lymphocyte immunity against weak antigens, notably self-proteins. The method entails that antigen presenting cells are induced to present at least one CTL epitope of the weak antigen and at the same time presenting at least one foreign T-helper lymphocyte epitope. In a preferred embodiment, the antigen is a cancer specific antigen, e.g. PSM, Her2, or FGF8b. The method can be exercised by using traditional polypeptide vaccination, but also by using live attenuated vaccines or nucleic acid vaccination. The invention furthermore provides immunogenic analogues of PSM, Her2 and FGF8b, as well as nucleic acid molecules encoding these analogues. Also vectors and transformed cells are disclosed. The invention also provides for a method for identification of immunogenic analogues of weak or non-immunogenic antigens.Type: ApplicationFiled: May 19, 2003Publication date: July 22, 2004Applicant: M&E Biotech A/SInventors: Lucilla Steinaa, Soren Mouritsen, Anand Gautam, Jesper Haaning, Iben Dalum, Peter Birk, Dana Leach, Klaus Gregorius Nielsen, Gunilla Karlsson
-
Publication number: 20040115211Abstract: The present invention is based on the identification and characterization of a number of M. tuberculosis derived novel proteins and protein fragments (SEQ ID NOs: 2, 4, 6, 8, 10, 12, 14, 16, 17-23, 42, 48, 50, 52, 54, 56, 58, 60, 62, 64, 66, 68, 70, 72-86, 88, 90, 92, 94, 141, 143, 145, 147, 149, 151, 153, and 168-171). The invention is directed to the polypeptides and immunologically active fragments thereof, the genes encoding them, immunological compositions such as vaccines and skin test reagents containing the polypeptides. Another part of the invention is based on the surprising discovery that fusions between ESAT-6 and MPT59 are superior immunogens compared to each of the unfused proteins, respectively.Type: ApplicationFiled: July 15, 2003Publication date: June 17, 2004Inventors: Peter Andersen, Rikke Skiot, Thomas Oettinger, Peter Birk Rasmussen, Ida Rosenkrands, Karin Weldingh, Walter Florio
-
Patent number: 6641814Abstract: The present invention is based on the identification and characterization of a number of M. tuberculosis derived novel proteins and protein fragments (SEQ ID NOs: 2, 4, 6, 8, 10, 12, 14, 16, 17-23, 42, 48, 50, 52, 54, 56, 58, 60, 62, 64, 66, 68, 70, 72-86, 88, 90, 92, 94, 141, 143, 145, 147, 149, 151, 153, and 168-171). The invention is directed to the polypeptides and immunologically active fragments thereof, the genes encoding them, immunological compositions such as vaccines and skin test reagents containing the polypeptides. Another part of the invention is based on the surprising discovery that fusions between ESAT-6 and MPT59 are superior immunogens compared to each of the unfused proteins, respectively.Type: GrantFiled: March 30, 1998Date of Patent: November 4, 2003Assignee: Statens Serum InstitutInventors: Peter Andersen, Rikke Nielsen, Thomas Oettinger, Peter Birk Rasmussen, Ida Rosenkrands, Karin Weldingh, Walter Florio