Abstract: A milking device includes a vessel and cover plate. The vessel and the cover plate form a sealed volume that is internally divided into a collecting chamber, a vacuum chamber and an air intake chamber. The collecting chamber is arranged between the vacuum chamber and the air intake chamber. The vessel has a first internal wall that separates the collecting chamber from the air intake chamber, with a first passage between the collecting chamber and the air intake chamber arranged at the first internal wall. The vessel has a second internal wall that separates the collecting chamber from the vacuum chamber, with a second passage between the collecting chamber and the vacuum chamber arranged at the second internal wall.
Type:
Grant
Filed:
January 19, 2012
Date of Patent:
August 9, 2016
Assignee:
PHARMING INTELLECTUAL PROPERTY BV
Inventors:
Mourad Salaheddine, Marc Peter Elvira Maria Klyutmans, Pieter Cornelis Johannes Maria Streng
Abstract: A method for providing a software based secure, robust, flexible, usable, and auditable single method that can practically eliminate threat occurring from phishing, man-in-middle theft, pharming/channel redirection, piggybacking of spyware, and application modification in client applications. These can be very strongly achieved using dynamic virtualization technology. This virtualization technology entirely protects applications from such threats is by creating highly dynamic virtual images of real data that are private, relative, one-time use, and short-lived. These virtual images are strongly made private and relative by creating virtual device id of the client device, virtual application signature of the client application, virtual private network of the network and virtual certificate of the server.
Abstract: A milking device includes a vessel and cover plate. The vessel and the cover plate form a sealed volume that is internally divided into a collecting chamber, a vacuum chamber and an air intake chamber. The collecting chamber is arranged between the vacuum chamber and the air intake chamber. The vessel has a first internal wall that separates the collecting chamber from the air intake chamber, with a first passage between the collecting chamber and the air intake chamber arranged at the first internal wall. The vessel has a second internal wall that separates the collecting chamber from the vacuum chamber, with a second passage between the collecting chamber and the vacuum chamber arranged at the second internal wall.
Type:
Application
Filed:
January 19, 2012
Publication date:
December 25, 2014
Applicant:
Pharming Intellectual Property BV
Inventors:
Mourad Salaheddine, Marc Peter Elvira Maria Kluytmans, Pieter Cornelis Johannes Maria Streng
Abstract: The present invention provides a technique of preventing a user from being tricked into revealing personal information by pharming. Security server 50 checks whether a combination of a domain name and an IP address of WWW site 30 to be accessed by PC 10 is registered in access-permit DB 55a or access-inhibit DB 55b. Security sever 50 also checks whether the combination is registered in any of secure DNS servers 40 registered in secure DNS DB 55c. On the basis of a result of the checks, security server 50 controls an access by PC 10 to WWW site 30.
Type:
Application
Filed:
September 28, 2006
Publication date:
April 2, 2009
Applicant:
TREND MICRO INCORPORATED
Inventors:
Yuji Yamasaki, Samuel Pu, Pender Chang, Andrew Lee, Descartes Chen, Jill Yang, Charles Yu, Vincent Chen, Jayce Chang
Abstract: Provided is an Internet information security technique, and more particularly, a method for alerting a user that a connected web site is a phishing site by comparing connected web site information with normal site information. To this end, the method includes the steps of: (a) extracting information on a presently connected site; (b) if information on a normal site having the same domain as the connected site exists in a database, comparing the connected site information with the normal site information; and (c) if the connected site information does not match the normal site information, alerting a user that the connected site is a phishing site. Therefore, the user may safely use the Internet by confirming whether the connected web site is a phishing site.
Type:
Application
Filed:
March 27, 2008
Publication date:
February 26, 2009
Inventors:
Jung Min KANG, Do Hoon LEE, Eng Ki PARK, Choon Sik PARK
Abstract: The present invention relates to the use of a C1 inhibitor (C1INH) with shorter half-life than plasma-derived C1INH for the preparation of a medicament for the transient treatment of an individual. It relates to both therapeutic and prophylactic treatment. The method of the invention allows for the administration of C1INH at certain therapeutic levels for a concise pre-determined time span. Pharmaceutical compositions based on C1INH with shorter half-lives may be used both in situations where transient treatment is merely and advantage. The advantage of the use according to the invention is that an individual is not exposed to C1INH for longer than required, since the levels of the C1INH more rapidly subsides after administration has stopped. In contrast, levels of plasma-derived C1INH would remain elevated for a prolonged period of time.
Abstract: The present invention provides a technique of preventing a user from being tricked into revealing personal information by pharming. Security server 50 checks whether a combination of a domain name and an IP address of WWW site 30 to be accessed by PC 10 is registered in access-permit DB 55a or access-inhibit DB 55b. Security sever 50 also checks whether the combination is registered in any of secure DNS servers 40 registered in secure DNS DB 55c. On the basis of a result of the checks, security server 50 controls an access by PC 10 to WWW site 30.
Type:
Grant
Filed:
September 28, 2006
Date of Patent:
June 5, 2012
Assignee:
Trend Micro Incorporated
Inventors:
Yuji Yamasaki, Samuel Pu, Pender Chang, Andrew Lee, Descartes Chen, Jill Yang, Charles Yu, Vincent Chen, Jayce Chang
Abstract: The present invention relates to the use of a C1 inhibitor (C1INH) with shorter half-life than plasma-derived C1INH for the preparation of a medicament for the transient treatment of an individual. It relates to both therapeutic and prophylactic treatment. The method of the invention allows for the administration of C1INH at certain therapeutic levels for a concise pre-determined time span. Pharmaceutical compositions based on C1INH with shorter half-lives may be used both in situations where transient treatment is merely and advantage. The advantage of the use according to the invention is that an individual is not exposed to C1INH for longer than required, since the levels of the C1INH more rapidly subsides after administration has stopped. In contrast, levels of plasma-derived C1INH would remain elevated for a prolonged period of time.
Abstract: A secure authentication process detects and prevents phishing and pharming attacks for specific web sites. The process is based on a dedicated secure hardware store for user sign-in credentials, a database of information about specific web sites, and a private secure browser. All user web activity is monitored by an agent program. The agent program checks to make sure that user attempts to send any sign-in credentials stored in secure hardware store of user sign-in credentials, to any web site accessed by the user, is allowed only if the IP address of the web site accessed by the user matches at least one of the IP addresses stored web site database associated with the sign-in credential the user is attempting to send. The process also detects mismatches between a URL and the actual IP address of the web site associated with the URL.
Abstract: Detection for pharming attacks and specifically for changes in name-to-IP resolutions on a computer system using rules is described. The DNS settings and the Hosts file on a computer system are monitored and their modification information is saved as a part of the historical data over time. When an IP address is determined for a host name, various rules are applied to the IP address in connection with the saved historical data, such that each rule produces a score based on various criteria. Different rules may have different weights assigned to their scores. The scores of all the rules are summed up to produce a final score. If the final score is above a predefined value, then there is a suspicious change in the IP address, and an alert is sent. Otherwise, the host name and the IP address are saved as a part of the historical data.
Abstract: Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources, such as a single remote trusted source and/or a trusted peer network. When a site certificate is received on a host computer system, certificate information associated with the received site certificate is obtained and compared with the stored certificate information to determine whether or not the site certificate indicates malicious activity, such as a malicious DNS redirection or a fraudulent local certificate. When a site certificate is not found indicative of malicious activity, the site certificate is released. Alternatively, when a site certificates is found indicative of malicious activity protective action is taken. In some embodiments, a user's log-in credentials are automatically obtained from a trusted local cache and automatically submitted to a web site.
Type:
Application
Filed:
July 31, 2007
Publication date:
February 5, 2009
Inventors:
Paul Agbabian, William E. Sobel, Bruce McCorkendale
Abstract: A secure authentication process detects and prevents phishing and pharming attacks for specific web sites. The process is based on a dedicated secure hardware store for user sign-in credentials, a database of information about specific web sites, and a private secure browser. All user web activity is monitored by an agent program. The agent program checks to make sure that user attempts to send any sign-in credentials stored in secure hardware store of user sign-in credentials, to any web site accessed by the user, is allowed only if the IP address of the web site accessed by the user matches at least one of the IP addresses stored web site database associated with the sign-in credential the user is attempting to send. The process also detects mismatches between a URL and the actual IP address of the web site associated with the URL.
Abstract: Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources, such as a single remote trusted source and/or a trusted peer network. When a site certificate is received on a host computer system, certificate information associated with the received site certificate is obtained and compared with the stored certificate information to determine whether or not the site certificate indicates malicious activity, such as a malicious DNS redirection or a fraudulent local certificate. When a site certificate is not found indicative of malicious activity, the site certificate is released. Alternatively, when a site certificates is found indicative of malicious activity protective action is taken. In some embodiments, a user's log-in credentials are automatically obtained from a trusted local cache and automatically submitted to a web site.
Type:
Grant
Filed:
July 31, 2007
Date of Patent:
April 23, 2013
Assignee:
Symantec Corporation
Inventors:
Paul Agbabian, William E. Sobel, Bruce McCorkendale
Abstract: Transgenes for producing recombinant polypeptides transgenic bovine species are described. A transgene for producing recombinant polypeptides in the milk of transgenic bovine species comprises at least one expression regulation sequence, a secretory DNA sequence encoding a secretory signal sequence which is functional in mammary secretory cells of the bovine species and a recombinant DNA sequence encoding the recombinant polypeptide. Also included are methods for producing transgenic bovine species. The method includes introducing the above transgene into an embryonal target cell of a bovine species, transplanting the transgenic embryonic target cell formed thereby into a recipient bovine parent and identifying at least one female offspring which is capable of producing the recombinant polypeptide in its milk.
Type:
Grant
Filed:
September 21, 1998
Date of Patent:
May 23, 2000
Assignee:
Pharming B.V.
Inventors:
Herman A. DeBoer, Rein Strijker, Herbert L. Heyneker, Gerard Platenburg, Sang He Lee, Frank Pieper, Paul J. A. Krimpenfort
Abstract: A software based method and system providing secure and robust multifactor authentication of internet users using at least one factor each of 1) Something you know; 2) Something you have; and 3) Something you are—A physical characteristic of the user or his/her computer/device. This method of authenticating the identity of a user to determine access to a host includes providing an encrypted key string based on one or more static and dynamic factors corresponding the data instances of a user or his/her computer/device, one or more static and dynamic factors corresponding the data instances of the host, and user input factors; evaluating the factor-based data instances to determine if the user's identity is authenticated; and granting or restricting the user's access to the host based on authentication results. The provider generates a key string based on the inputs gathered/provided, time stamps the key, encrypts the key and sends it to the host.
Abstract: Transgenes for producing recombinant polypeptides transgenic bovine species. A transgene for producing recombinant polypeptides in the milk of transgenic bovine species comprises at least one expression regulation sequence, a secretory DNA sequence encoding a secretory signal sequence which is functional in mammary secretory cells of the bovine species and a recombinant DNA sequence encoding the recombinant polypeptide. Also included are methods for producing transgenic bovine species. The method includes introducing the above transgene into an embryonal target cell of a bovine species, transplanting the transgenic embryonic target cell formed thereby into a recipient bovine parent and identifying at least one female offspring which is capable of producing the recombinant polypeptide in its milk.
Type:
Application
Filed:
November 12, 2004
Publication date:
September 8, 2005
Applicant:
Pharming B.V., a Netherlands corporation
Inventors:
Herman DeBoer, Rein Strijker, Herbert Heyneker, Gerard Plantenburg, Sang Lee, Frank Pieper, Paul Krimpenfort
Abstract: Transgenes for producing recombinant polypeptides transgenic bovine species. A transgene for producing recombinant polypeptides in the milk of transgenic bovine species comprises at least one expression regulation sequence, a secretory DNA sequence encoding a secretory signal sequence which is functional in mammary secretory cells of the bovine species and a recombinant DNA sequence encoding the recombinant polypeptide. Also included are methods for producing transgenic bovine species. The method includes introducing the above transgene into an embryonal target cell of a bovine species, transplanting the transgenic embryonic target cell formed thereby into a recipient bovine parent and identifying at least one female offspring which is capable of producing the recombinant polypeptide in its milk.
Type:
Application
Filed:
June 11, 2002
Publication date:
October 9, 2003
Applicant:
Pharming B.V.
Inventors:
Herman A. DeBoer, Rein Strijker, Herbert L. Heynecker, Gerard Platenburg, Sang Ha Lee, Frank Pieper, Paul J.A. Krimpenfort
Abstract: Transgenes for producing recombinant polypeptides transgenic bovine species. A transgene for producing recombinant polypeptides in the milk of transgenic bovine species comprises at least one expression regulation sequence, a secretory DNA sequence encoding a secretory signal sequence which is functional in mammary secretory cells of the bovine species and a recombinant DNA sequence encoding the recombinant polypeptide. Also included are methods for producing transgenic bovine species. The method includes introducing the above transgene into an embryonal target cell of a bovine species, transplanting the transgenic embryonic target cell formed thereby into a recipient bovine parent and identifying at least one female offspring which is capable of producing the recombinant polypeptide in its milk.
Type:
Grant
Filed:
June 7, 1995
Date of Patent:
October 31, 2000
Assignee:
Pharming B.V.
Inventors:
Herman A. Deboer, Rein Strijker, Herbert L. Heyneker, Gerard Platenburg, Sang He Lee, Frank Pieper, Paul J. A. Krimpenfort
Abstract: Transgenes for producing recombinant polypeptides transgenic bovine species. A transgene for producing recombinant polypeptides in the milk of transgenic bovine species comprises at least one expression regulation sequence, a secretory DNA sequence encoding a secretory signal sequence which is functional in mammary secretory cells of the bovine species and a recombinant DNA sequence encoding the recombinant polypeptide. Also included are methods for producing transgenic bovine species. The method includes introducing the above transgene into an embryonal target cell of a bovine species, transplanting the transgenic embryonic target cell formed thereby into a recipient bovine parent and identifying at least one female offspring which is capable of producing the recombinant polypeptide in its milk.
Type:
Grant
Filed:
June 5, 1995
Date of Patent:
January 11, 2000
Assignee:
Pharming B.V.
Inventors:
Herman A. Deboer, Rein Strijker, Herbert L. Heyneker, Gerard Platenburg, Sang He Lee, Frank Pieper, Paul J. A. Krimpenfort
Abstract: The present invention relates to the use of a C1 inhibitor (C1INH) with shorter half-life than plasma-derived C1INH for the preparation of a medicament for the transient treatment of an individual. It relates to both therapeutic and prophylactic treatment. The method of the invention allows for the administration of C1INH at certain therapeutic levels for a concise pre-determined time span. Pharmaceutical compositions based on C1INH with shorter half-lives may be used both in situations where transient treatment is merely and advantage. The advantage of the use according to the invention is that an individual is not exposed to C1INH for longer than required, since the levels of the C1INH more rapidly subsides after administration has stopped. In contrast, levels of plasma-derived C1INH would remain elevated for a prolonged period of time.