发明名称 REGIOSELECTIVE PREPARATION OF 2 -AMINO-5-TRIFLUOROMETHYLPYRIMIDIN E DERIVATIVES.
摘要 <p>The present invention relates to a method of making pyrimidines of formula (III) wherein X2 is a leaving group selected from the group consisting of: phenyloxy optionally substituted by 1-5 suitable substituents, heterocyclyl N-oxy optionally substituted by 1-5 suitable substituents, and heteroaryl N-oxy optionally substituted by 1-5 suitable substituents; R1 and R2 are substituents independently selected from the group consisting of hydrogen, an aromatic group and an aliphatic group, or taken together -N(R1)R2 can form a 4-11 membered aromatic or aliphatic ring; said method comprising reacting a compound of formula (I) with an amine of formula (Il) [HN(R1)R2] to form a compound of formula (III), wherein X1 is a leaving group. The present invention relates to a method of making pyrimidines of formula (III) wherein X2 is a leaving group selected from the group consisting of: phenyloxy optionally substituted by 1-5 suitable substituents, heterocyclyl N-oxy optionally substituted by 1-5 suitable substituents, and heteroaryl N-oxy optionally substituted by 1-5 suitable substituents; R1 and R2 are substituents independently selected from the group consisting of hydrogen, an aromatic group and an aliphatic group, or taken together -N(R1)R2 can form a 4-11 membered aromatic or aliphatic ring; said method comprising reacting a compound of formula (I) with an amine of formula (Il) [HN(R1)R2] to form a compound of formula (III), wherein X1 is a leaving group. The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.</p>
申请公布号 MX2012001469(A) 申请公布日期 2012.02.22
申请号 MX20120001469 申请日期 2010.08.13
申请人 BOEHRINGER INGELHEIM INTERNATIONAL GMBH 发明人 JUERGEN SCHNAUBELT;GUENTER LINZ;GERD KRAEMER;SABRINA KUSSEROW
分类号 C07D239/34;C07D239/47;C07D401/12 主分类号 C07D239/34
代理机构 代理人
主权项
地址