摘要:
Method and system for centralized control of data transfers between a Web client and a Web application by receiving a response from the Web application. After determining an offending character is present, cloaking the response from the Web application to a request from a Web client, and sending the cloaked response to the Web client through a security product which otherwise rejects the offending character.
摘要:
Method and system to build rich input validation rules to address values not previously validated by type based rules or regular expressions available in current validation engines. These new validation rules have a rich set of ordered validation rule primitives (VRPs) with acceptance VRP or rejection VRP, thus the new validation rules have capabilities to handle complex data values. Also disclosed are method and system to build a validation rule applied to data elements defined using a Perl regular expression.
摘要:
Compounds having the formula I: ##STR1## are leukotriene antagonists and inhibitors of leukotriene biosynthesis. These compounds are useful as anti-asthmatic, anti-allergic, anti-inflammatory, and cytoprotective agents. They are also useful in treating angina, cerebral spasm, glomerular nephritis, hepatitis, endotoxemia, uveitis, and allograft rejection.
摘要:
A method of controlling data transfer between a Web client and a Web application by building a response with a target. The target indicates a destination to an impromptu component of the Web application. The target is signed when a response is built. After receiving the response by the Web client; the corresponding a request from the Web client includes the signed target. The request is received by an entry point of the Web application. The entry point has existing validation rules. The validation rules are by-passed when the signed target is verified. The target is restored in the request to the original state; and dispatched to the impromptu component.
摘要:
Mechanisms for external and distributed protection of Web application data against prying, tampering, and impersonation using cryptographic mechanisms are provided. The protection is offered opaquely so as to not expose the cryptographic mechanism to the Web application. Protection against prying prevents users from looking at data the Web application considers private. When protected against prying, protect data may be sent to the client but the user will not be able to understand it. Protection against tampering, guaranties the Web application that the data it is receiving originated from a trusted source, usually the Web application itself. A user session state stored client-side is a good candidate for tampering protection. Protection against impersonation ensures the Web application that the data it is receiving comes from a specific user.
摘要:
A method and a system for external and distributed protection of Web application data against prying, tempering, and impersonation using cryptographic mechanisms. The protection is offered opaquely so as to not expose the cryptographic mechanism to the Web application. Protection against prying prevents users from looking at data the Web application considers private. When protected against prying, protect data may be sent to the client but the user will not be able to understand it. Protection against tempering, guaranties the Web application that the data it is receiving originated from a trusted source, usually the Web application itself. A user session state stored client-side is a good candidate for tempering protection. Protection against impersonation ensures the Web application that the data it is receiving comes from a specific user.
摘要:
A method of validating parameters of a request from a Web client to a Web application. The validation rules are sent to a Web client, together with a response to a Web client. The parameters in a response are updated by the Web client. The updated parameters are sent in a subsequent request to the Web client, along with the validation rules. The updated parameters are validated using the validation rules in the request, thus achieving stateless validation. The validation rules are preferably digitally signed.
摘要:
The present invention relates to biphenyl-based renin inhibitor compounds having amino-terminal groups, and their use in treating cardiovascular events and renal insufficiency.
摘要:
Heterocyclic compounds of structural formula (I), or a pharmaceutically acceptable salt thereof, wherein W is a R1— substituted heteroaryl, R1 is an heteroaryl ring substituted with an ester or carboxylic acid containing radical, X-T is N—CR5R6, C═CR5 or CR13—CR5R6, Y is a bond or —C(O)—, a and b represent an integer selected from 1 to 4, and Ar is an optionally substituted phenyl or naphtyl, are inhibitors of stearoyl-coenzyme A delta-9 desaturase (SCD) The heterocyclic compounds are useful for the prevention and treatment of conditions related to abnormal lipid synthesis and metabolism, including cardiovascular disease, atherosclerosis, obesity, diabetes, neurological disease, Metabolic Syndrome, insulin resistance, cancer, liver steatosis, and non-alcoholic steatohepatitis.
摘要:
The present invention relates to biphenyl-based renin inhibitor compounds having amino-terminal groups, and their use in treating cardiovascular events and renal insufficiency.