摘要:
Provided are adenosine analog compounds of the general formula that act as P2Y receptors, e.g., the P2Y2 receptor, including pharmaceutical compositions; and uses thereof to treat or prevent diseases associated with that receptor, e.g., disorders relating to mucus secretion, such as cystic fibrosis, chronic obstructive pulmonary disorder (COPD), asthma, constipation, chronic idiopathic constipation, dry mouth (xerostomia), gum disease, and gastrointestinal problems caused by radiation and chemotherapy for cancer.
摘要:
The invention provides adenosine analog compounds that act at P2Y receptors, e.g., the P2Y2 receptor, including pharmaceutical compositions; and uses thereof to treat or prevent diseases associated with that receptor, e.g., disorders relating to mucus secretion, such as cystic fibrosis, chronic obstructive pulmonary disorder (COPD), asthma, constipation, chronic idiopathic constipation, dry mouth (xerostomia), gum disease, and gastrointestinal problems caused by radiation and chemotherapy for cancer.
摘要:
Chemokine receptor antagonists, in particular, compounds of Formula (I) that act as antagonists of the chemokine CCR2 receptor, including pharmaceutical compositions and uses thereof to treat or prevent diseases associated with monocyte accumulation, lymphocyte accumulation or leukocyte accumulation are described herein.
摘要:
Chemokine receptor antagonists, in particular, compounds of Formula (I) that act as antagonists of the chemokine CCR2 receptor, including pharmaceutical compositions and uses thereof to treat or prevent diseases associated with monocyte accumulation, lymphocyte accumulation or leukocyte accumulation are described herein.
摘要:
A method of updating a content detection module includes obtaining content detection data, and transmitting the content detection data to a content detection module, wherein the transmitting is performed not in response to a request from the content detection module. A method of sending content detection data includes obtaining content detection data, selecting an update station from a plurality of update stations, and sending the, content detection data to the selected update station. A method of building a content detection system includes establishing a first communication link between a central station and an update station, the central station configured to transmit content detection data to the update station, and establishing a second communication link between the update station and a content detection module.
摘要:
An integrated security switch and related method for managing connectivity and security among networks. The integrated security switch includes a security function connectable with a first network and at least one switching function connectable with a second network. A common management interface driven by both command line interface and graphic user interface protocols manages the switching function via a management path dedicated between the security function and the switching function. The common management interface enables secure switching of traffic to flow via a traffic path dedicated between the switching function and the security function. Typically, the traffic is a flow of data between the Internet and a group of networked users such as a wide area network.
摘要:
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a method for virus processing content objects is provided. A type associated with a content object is determined. Based on the type, a subset of instructions is read from a virus signature memory containing intermixed op-codes of a first instruction type associated with primitive instructions and of a second instruction type associated with Content Pattern Recognition (CPR) instructions. Then, instructions of the first instruction type are assigned for execution to a primitive instruction pipe of a virus co-processor and instructions of the second instruction type are assigned for execution to a CPR instruction pipe of the virus co-processor. An instruction is executed by the CPR instruction pipe, including accessing a portion of the content object from a system memory and comparing the portion of the content object against a string associated with the instruction.
摘要:
A method for managing network traffic flow is provided. The method includes receiving network traffic content, storing at least a portion of the network traffic content to a memory, sending a copy of the network traffic content to a processor, which determines whether the network traffic content contains content desired to be detected. Another method for managing network traffic flow includes receiving network traffic content, flagging the network traffic content, sending the flagged network traffic content to a module, which is configured to pass unflagged data to a user and prevent flagged data from being sent to the user, and sending a copy of the network traffic content to a processor, which determines whether the network traffic content contains content desired to be detected.
摘要:
A device for detecting network traffic content is provided. The device includes a processor configured to receive a signature associated with content desired to be detected, and execute one or more functions based on the signature to determine whether network traffic content matches the content desired to be detected. The signature is defined by one or more predicates. A computer readable medium for use to detect network traffic content is also provided. The computer readable medium includes a memory storing one or more signatures, each of the one or more signatures associated with content desired to be detected. Each of the one or more signatures is defined by one or more predicates, and each of the one or more predicates can be compiled into a byte code stream that controls a logic of a network traffic screening device.
摘要:
Methods and systems for an intelligent network protection gateway (NPG) and network architecture are provided. According to one embodiment, a firewall provides network-layer protection to internal hosts against unauthorized access by hosts of an external network by performing network address translation (NAT) processing of Internet Protocol (IP) addresses. The firewall changes data in headers of VoIP packets and corresponding data contents of the VoIP packets, to enable bi-directional VoIP communications. An external VoIP interface of the firewall receives incoming VoIP packets having a user alias (e.g., an email address) and an indication regarding a VoIP port of external interface. The packets are directed to an appropriate internal host by the firewall performing port address forwarding based on the port indication to a Session Initiation Protocol (SIP) server within the internal network that maintains a mapping of user aliases to private addresses of the internal hosts.