摘要:
This invention relates to relates to methods for producing gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals. The invention also relates to pharmaceutical compositions comprising gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals and the use of gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.
摘要:
The present invention relates to naturally occurring and chemically synthesized small molecule antagonists of XIAP family proteins. In particular, the present invention provides embelin and other XIAP inhibitors and methods of using these compounds as antagonists of the anti-apoptotic effects of XIAP family member proteins. The present invention also provides methods for treating diseases and pathologies (e.g., neoplastic diseases).
摘要:
Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula: wherein R1 is C1-6 alkyl or C3-6cycloalkyl; or wherein R2 is substituted with one or two halogen(s) or OC1-3alkyl.
摘要:
This invention relates to relates to methods for producing gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals. The invention also relates to pharmaceutical compositions comprising gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals and the use of gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.
摘要:
The invention relates to conformationally constrained mimetics of Smac which function as inhibitors of Inhibitor of Apoptosis Proteins. The invention also relates to the use of these mimetics for inducing apoptotic cell death and for sensitizing cells to inducers of apoptosis.
摘要:
The invention relates to the compound apogossypolone and salts and prodrugs thereof. Apogossypolone functions as an inhibitor of Bcl-2 family proteins. The invention also relates to the use of apogossypolone for inhibiting hyperproliferative cell growth, for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.
摘要:
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.
摘要:
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. A secure on-demand supply system and a traffic type acquisition method are disclosed. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics. The system of the disclosure satisfies security requirements of various users and various traffics, provides personalized security assurances for the users, and enhances user experience.
摘要:
The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein the signatory S selects three braids xεLBm(l), x′εBn(l), aεBn(l), and considers braid pair (x′,x) as a public key of S, braid a as a private key of S; Signatory S uses hash function h for a message M needing signature to get y=h(M)εBn(l); generating a braid bεRBn−1−m(l) randomly, then signing the message M with the own private key a and the braid b generated randomly to obtain Sign(M)=a−1byb−1a; a signature verifying party V obtains the public key of S, calculating the message M by employing a system parameter hash function h, obtaining the y=h(M); judging whether sign(M) and y are conjugate or not, if not, sign(M) is an illegal signature, the verification fails; if yes, sign(M) is a legal signature of message M; the present invention avoids the problem of k-CSP in SCSS signature scheme of prior art, and improves the security of signature algorithm and reduces the number of braids involved and the number for conjugacy decision without reducing security, thereby improving the operation efficiency of signature.
摘要翻译:本发明公开了一种基于编织群共轭问题的数字签名方案及其验证方法,其中签名者S选择三个辫子bra B m SUB SUB SUB SUB SUB SUB SUB SUB SUB SUB (l),aepsilonB(1),并将辫子对(x',x)视为S的公钥,辫子a作为S的私钥; 签名者S使用哈希函数h来获得需要签名的消息M,以获得y = h(M)epsilonB(1); 随机生成辫子bepsilonRB n-1-m(l),然后用自己的私钥a签署消息M,随机生成辫子b以获得Sign(M)= a& 1 SUP> BYB SUP> -1; 签名验证方V获得S的公开密钥,通过采用系统参数散列函数h来计算消息M,获得y = h(M); 判断符号(M)和y是否是共轭的,如果不是,则(M)是非法签名,验证失败; 如果是,则(M)是消息M的合法签名; 本发明避免了现有技术的SCSS签名方案中的k-CSP问题,提高了签名算法的安全性,减少了涉及的辫子数量和共轭决定的数量,而不降低安全性,从而提高了签名的操作效率。
摘要:
A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after receiving an access from a user, an SP determines whether an IDP to which the user attaches is located in a trust domain of the SP (S102); if the IDP to which the user attaches is not located in the trust domain of the SP, the SP inquires of an IDP in a local trust domain about the IDP to which the user attaches (S104); if the SP receives information of the IDP to which the user attaches, wherein the information is returned by an IDP in the local trust domain, the SP adds the IDP to which the user attaches to a temporary trust list to establish a trust for the IDP to which the user attaches (S106). The present disclosure can establish a trust relationship between an SP and any IDP in case of adding or not adding extra devices, ensuring the user to obtain desired services after logging on for one time.