BLOCK CHAIN SECURITY

Brand Owner Address Description
BLOCKCHAIN SECURITY Petronella Technology Group, Inc. Suite 200 5540 Centerview Dr. Raleigh NC 27606 BLOCK CHAIN SECURITY;SECURITY;Information technology consulting services; consulting in the field of information technology; consulting services in the fields of cybersecurity, information security, computer security, network security and monitoring of information technology infrastructure for computer and network security purposes; computer and network security services in the nature of computer and network monitoring services for the purpose of cyber security and information technology network security; providing assessment of threats to information technology networks; computer and digital forensic services; computer research services, namely, computer security threat analysis for protecting data; data mining; digital watermarking; industrial analysis and research services in the field of computer software and data security; design and development of computer hardware and software; computer software design and development; industrial analysis and research in the field of cybersecurity; computer security threat analysis for protecting data; computer services, namely, encrypted data recovery services; data encryption services; computer and digital forensic services; computer software testing, namely, source code review; computer forensics services; computer security audits, namely, scanning and penetration testing of computers and networks to assess information regarding security vulnerability; computer security consultancy; computer services, namely, hosting of digital content on the internet; computer security consultancy in the field of analyzing, preventing and detecting digital and online threats consisting of computer virus, malware and phishing attacks; cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; information technology consultation in the field of turnaround and crisis management; cyber security services, namely, monitoring of computer systems for detecting unauthorized access or data breach, computer security threat analysis for protecting data, computer security consultancy; cyber security consulting, mitigation and services, namely, computer security consultancy, data security consultancy, internet security consultancy; software as a service (saas) services featuring secure software that enables encryption and protection of data; Software as a service (saas) services featuring software for preventing, investigating, and responding to cyber security incidents by tracking, analyzing, and managing data; software as a service (saas) services featuring software for monitoring, managing, and securing computer systems, networks, and digital assets;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and system for processing packets allows consolidation of security processing. Security processing is performed in accordance with multiple security policies. This processing is done in a single front end processing block. Different security processes can be performed in parallel. Processing overhead is reduced by eliminating the need to redundantly check packet characteristics to assess the different security requirements imposed by security policies. Further, the present invention also substantially reduces the CPU cycles required to transport data back and forth from memory to a cryptographic coprocessor.