会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Rapid Thermal Isomerization of Lycopene
    • US20210214291A1
    • 2021-07-15
    • US16752139
    • 2020-01-24
    • Michael Lloyd
    • Michael Lloyd
    • C07C5/25B01J19/12
    • The use of lycopene has been demonstrated to be effective in decreasing risk factors associated with cardiovascular disease, skin cancer and prostate cancer in mammals. Lycopene is difficult to solubilize in its native trans-lycopene form. Cis-lycopene, formed by applying thermal energy generated by excitation of polar molecules through microwave-assisted processing, appears in several isomeric forms. The cis isomers are effective in improving lycopene micellularization, bioaccessibility and mammalian absorption. The cis isomers are effective in improving vascular circulation of lycopene by way transport vesicle low density lipo-protein (LDL). Lycopene-based ingredients, end products, functional foods, medical foods and nutraceuticals, containing isomerized cis-lycopene can be used in place of ingredients with more naturally abundant trans-lycopene as phytonutrient, micronutrient and antioxidant delivery vehicles through dietary consumption to improve the outcomes of a variety of conditions, including hypertension, cardiovascular disease, skin cancer, prostate cancer, macular degeneration and related proinflammatory conditions.
    • 7. 发明授权
    • Adaptive risk analysis methods and apparatus
    • 自适应风险分析方法和设备
    • US08321944B1
    • 2012-11-27
    • US11761982
    • 2007-06-12
    • Alain Jules MayerBrian LaingMichael Lloyd
    • Alain Jules MayerBrian LaingMichael Lloyd
    • G06F11/00
    • H04L63/1433G06F21/577G06F2221/2145H04L41/22H04L67/125H04L67/36
    • A computer system method includes receiving a network topology and associated configuration data, wherein the network topology indicates a host location and a threat location, determining a vulnerability associated with the host location, determining a security exposure for the host location with respect to the threat location from the configuration data, the network topology, and to incomplete configuration data for the host location, determining a first vulnerability certainty for the host location with respect the vulnerability in response to incomplete configuration data, thereafter receiving updated network data selected from a group consisting of: updated configuration data, updated network topology, determining an updated security exposure for the host location with respect to the threat location from the updated network data, and to the incomplete configuration data, and displaying a difference between of the first security exposure and the second security exposure on the display.
    • 计算机系统方法包括接收网络拓扑和相关联的配置数据,其中所述网络拓扑指示主机位置和威胁位置,确定与所述主机位置相关联的漏洞,确定所述主机位置相对于所述威胁位置的安全暴露 从所述配置数据,所述网络拓扑以及所述主机位置的不完整配置数据,响应于所述不完整配置数据确定所述主机位置的所述主机位置的第一漏洞确定性,然后接收从由以下组成的组中选择的更新的网络数据: :更新的配置数据,更新的网络拓扑,从更新的网络数据确定相对于威胁位置的主机位置的更新的安全曝光以及不完整的配置数据,以及显示第一安全曝光和第二安全曝光之间的差异 安全隐患 ay。