David Scheinberg - New York NY, US Michael McDevitt - Bronx NY, US Paul Borchardt - New York NY, US Dangshe Ma - Rockville MD, US
International Classification:
A61K051/00 C07F005/00
US Classification:
424/001650, 534/013000
Abstract:
The present invention provides functionalized chelants and a method of treating cancerous cells with alpha particles comprising the step of administering a pharmacologically effective dose of an Ac conjugate comprising a functionalized chelant R is independently CHQCOX; Q is independently hydrogen; C1-C4 alkyl or (C1-C2 alkyl) phenyl; X is independently hydrogen; benzyl or C1-C4 alkyl; Z1 is (CH)Y where n is 1-10 and Y is an electrophilic or nucleophilic moiety and Z2 is R; or, alternatively, Z1 is hydrogen and Z2 is a peptide linker composed of 1-10 amino acids; said Y or said peptide linker covalently attached to an antibody or fragment thereof, or other biologic molecule; or a pharmaceutically acceptable salt thereof, complexed with Ac. These biologic molecule binds to cancerous cells and Ac or its daughters emit alpha particles into said cancerous cells effecting treatment.
Monitoring Supply Chains, Authenticating Goods And Authorizing Payment
- San Francisco CA, US Paul Borchardt - San Francisco CA, US Yuqi Wang - San Jose CA, US Charles Walter - Mountain View CA, US Nicholas Harvey - Pleasanton CA, US Kieran McCarthy - San Francisco CA, US John Aynsley - Belmont CA, US
International Classification:
G06Q 30/00 G06Q 20/40
Abstract:
In one aspect of specific embodiments, methods are provided for monitoring a supply chain, including detection of the gray market, stolen, or counterfeit goods. In another aspect of specific embodiments, methods are provided for determining an authenticity of goods during a payment process, and reporting authenticity results to an actor in the payment process to allow that actor to determine whether to complete or cancel the process. In some embodiments, at least one of an open key, hidden key, authentication request counter, and optionally, authentication request timer are associated in an authentication database with an item in an authentication server.
Analysis And Display Of Cybersecurity Risks For Enterprise Data
- Los Altos CA, US Spencer Elliott Graves - San Jose CA, US Paul Borchardt - San Francisco CA, US Chuck Chan - San Francisco CA, US
International Classification:
G06F 21/57 G06F 17/30
Abstract:
Systems and methods estimate expected loss risk to computers and enterprises based on the data files present on computers and data file clusters within the enterprise.