摘要:
A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after receiving an access from a user, an SP determines whether an IDP to which the user attaches is located in a trust domain of the SP (S102); if the IDP to which the user attaches is not located in the trust domain of the SP, the SP inquires of an IDP in a local trust domain about the IDP to which the user attaches (S104); if the SP receives information of the IDP to which the user attaches, wherein the information is returned by an IDP in the local trust domain, the SP adds the IDP to which the user attaches to a temporary trust list to establish a trust for the IDP to which the user attaches (S106). The present disclosure can establish a trust relationship between an SP and any IDP in case of adding or not adding extra devices, ensuring the user to obtain desired services after logging on for one time.
摘要:
A method for establishing an identity management trust, and an IDentification Provider (IDP) and a Service Provider (SP) are provided in the present disclosure. The method comprises: after receiving an access from a user, an SP determines whether an IDP to which the user attaches is located in a trust domain of the SP (S102); if theIDP to which the user attaches is not located in the trust domain of the SP, the SP inquires of an IDP in a local trust domain about the IDP to which the user attaches (S104); if the SP receives information of the IDP to which the user attaches, wherein the information is returned by an IDP in the local trust domain, the SP adds the IDP to which the user attaches to a temporary trust list to establish a trust for the IDP to which the user attaches (S106). The present disclosure can establish a trust relationship between an SP and any IDP in case of adding or not adding extra devices, ensuring the user to obtain desired services after logging on for one time.
摘要:
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics.
摘要:
A secure on-demand supply method is disclosed. The method includes: a configuration parameter of a security function module is determined according to a security level set for requested traffic by a user, and/or an application scenario of a user terminal, and/or a traffic type; the security function module is configured by using the configuration parameter; and security protection is carried out on traffic data of the user. A traffic type acquisition method for protecting security of a specific user and/or traffic is disclosed. The method includes: a traffic identifier of data is acquired by using a traffic type classification function of a Quality of Service (QoS) function module, to protect the security of the specific user and/or traffic. A secure on-demand supply system and a traffic type acquisition method are disclosed. The disclosure can provide various traffic security assurances according to security requirements of different users for different traffics. The system of the disclosure satisfies security requirements of various users and various traffics, provides personalized security assurances for the users, and enhances user experience.
摘要:
Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C═O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.
摘要:
This invention relates to compositions comprising co-crystals of (−)-gossypol with a C1-8 carboxylic acid or C1-8 sulfonic acid which are useful as inhibitors of Bcl-2 family proteins. The invention also relates to the use of co-crystals of (−)-gossypol with a C1-8 carboxylic acid or C1-8 sulfonic acid for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.
摘要:
Potent and selective ligands for the dopamine 3 (D3) receptor are disclosed. The D3 receptor ligands have a structural formula (I) wherein X is C═O or SO2, R1 is C1-6 alkyl, R2 is aryl, heteroaryl, aryl, —(CH2)1-3aryl, or —(CH2)1-3heteroaryl, and n is 0 or 1. Methods of using the D3 receptor ligands in the treatment of diseases and conditions wherein modulation of the D3 receptor provides a benefit also are disclosed.
摘要:
Inhibitors of STAT3 are disclosed. Methods of using the STAT3 inhibitors in the treatment of diseases and conditions wherein inhibition of STAT3 provides a benefit, like cancers, also are disclosed.
摘要:
The present invention relates to naturally occurring and chemically synthesized small molecule antagonists of XIAP family proteins. In particular, the present invention provides embelin and other XIAP inhibitors and methods of using these compounds as antagonists of the anti-apoptotic effects of XIAP family member proteins. The present invention also provides methods for treating diseases and pathologies (e.g., neoplastic diseases).
摘要:
This invention relates to relates to methods for producing gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals. The invention also relates to pharmaceutical compositions comprising gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals and the use of gossypol acetic acid co-crystals and (−)-gossypol acetic acid co-crystals for inducing apoptosis in cells and for sensitizing cells to the induction of apoptotic cell death.