COMPUTER SECURITY DEVICES

Brand Owner (click to sort) Address Description
DATA ARMOR HI-SECURITY CENTRE, INC. 3435 GALT OCEAN DRIVE FORT LAUDERDALE FL 33308 COMPUTER SECURITY DEVICES, NAMELY DATA ENCRYPTORS;DATA;
INFOLOCK INTEGRATED APPLICATIONS, INC. 5805 VALLEY BELT ROAD CLEVELAND OH 44131 COMPUTER SECURITY DEVICES;
K SCHLAGE LOCK COMPANY Princeton IL computer security devices, namely alarms and motion detectors, fitted security casings for computer hardware, anchoring devices, namely computer fasteners fitted for computer hardware and locking devices, namely computer security locks fitted for computer hardware;The stippling shown in the drawing of the mark is for shading purposes only and does not indicate color.;
K SCHLAGE LOCK COMPANY Princeton IL computer security devices, namely alarms and motion detectors, fitted security casings for computer hardware, anchoring devices, namely computer fasteners fitted for computer hardware and locking devices, namely computer security locks fitted for computer hardware;The mark is lined for the color green. The stippling shown in the drawing of the mark is for shading purposes only and does not indicate color.;
KRYPTONITE KRYPTONITE CORPORATION 320 Turnpike Street Canton MA 02021 computer security devices, namely, metal locks, metal locking mechanisms, metal security cable, metal integrated locks and cable;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.