COMPUTER HARDWARE COMPUTER SECURITY

Brand Owner (click to sort) Address Description
DIGITAL VAULT VISA INTERNATIONAL SERVICE ASSOCIATION 900 Metro Center Boulevard Foster City CA 94404 computer hardware and computer security and encryption software, namely, encryption keys, digital certificates, digital signature, secure data storage and the retrieval and transmission of confidential customer information used by individuals, banking and financial institutions;DIGITAL;
IT'S ME VISA INTERNATIONAL SERVICE ASSOCIATION 900 Metro Center Boulevard Foster City CA 94404 computer hardware and computer security and encryption software, namely, encryption keys, digital certificates, digital signature, secure data storage and the retrieval and transmission of confidential customer information used by individuals, banks and financial institutions;IT IS ME;
MASTERCARD, THE FUTURE OF TRANSACTIONS MASTERCARD INTERNATIONAL INCORPORATED 2000 Purchase Street Purchase NY 10577 Computer hardware and computer security software, namely encryption software, software for use in verifying digital signature and digital certificate, software for secure data storage and retrieval and transmission of confidential customer information used by individuals, banking and financial institutions; computer software for use in enabling smart cards to interact with terminals and readers, telecommunications equipment, and point of sale transaction terminals; computer software for transmitting, displaying, and storing sales transactions, buyers identification and financial information for use in the financial services, banking, and telecommunications industries; transponders; magnetic encoded cards and card containing integrated circuit chips, namely, bank cards, debit cards, credit cards and payment cards; magnetic coded card readers; electronic encryption keys; and electronic verification readers for verifying authentication of charge cards, bank cards, and payment cards;Financial services namely banking and credit services; providing credit card, debit card, charge card and stored value prepaid card services; providing credit, debit and payment accounts without a physical payment card, stored value electronic purse services, providing electronic funds and currency transfer services, electronic payments services, cash disbursement services, and transaction authorization and settlement services; provision of debit and credit card services by means of transponders; travel insurance services; check verification; issuing and redemption services all relating to travelers cheques and travel vouchers; financial advisory services and consultation relating to al the aforesaid services;MASTER CARD THE FUTURE OF TRANSACTIONS;
MAXTOR DRIVELOCK SEAGATE TECHNOLOGY 47488 Kato Road Fremont CA 94538 COMPUTER HARDWARE FOR COMPUTER SECURITY AND ENCRYPTION, COMPUTER SOFTWARE FOR ENCRYPTION IN THE FIELD OF COMPUTER SECURITY AND COMPUTER FIRMWARE FOR ENCRYPTION IN THE FIELD OF COMPUTER SECURITY SOLD AS AN INTEGRAL COMPONENT OF COMPUTER HARD DISK DRIVES; COMPUTER HARDWARE FOR COMPUTER SECURITY AND ENCRYPTION, COMPUTER SOFTWARE FOR ENCRYPTION IN THE FIELD OF COMPUTER SECURITY AND COMPUTER FIRMWARE FOR ENCRYPTION IN THE FIELD OF COMPUTER SECURITY, SOLD AS AN INTEGRAL COMPONENT OF COMPUTER HARD DISK DRIVES USED IN CONNECTION WITH PRODUCTS INCORPORATING DISK DRIVES AS A COMPONENT; COMPUTER HARDWARE FOR COMPUTER SECURITY AND ENCRYPTION, COMPUTER SOFTWARE FOR ENCRYPTION IN THE FIELD OF COMPUTER SECURITY AND COMPUTER FIRMWARE FOR ENCRYPTION IN THE FIELD OF COMPUTER SECURITY, SOLD AS AN INTEGRAL COMPONENT OF COMPUTER HARD DISK DRIVES USED IN CONNECTION WITH SET TOP BOXES, PERSONAL VIDEO TAPE RECORDERS, DVD RECORDERS, VIDEO TAPE RECORDERS, TELEVISION SETS, PERSONAL DIGITAL ASSISTANTS, AUDIO TAPE PLAYERS AND RECORDERS, MOBILE PHONES AND CELLULAR PHONES;MAXTOR DRIVE LOCK;
OMICRON OMICRON electronics GmbH Oberes Ried 1 Klaus A-6833 Austria Computer hardware for computer security, computer network security, data security and Internet security; downloadable computer software for computer security, computer network security, data security and Internet security; recorded computer software for computer security, computer network security, data security and Internet security; the aforesaid goods in particular for computer security, computer network security, data security and Internet security in the field of energy supply, energy supply networks, and energy supply components; the aforesaid goods in the field of power supply systems;Manuals, books, brochures, newsletters, publications in the nature of magazines, journals, and tutorials in printed form, each featuring topics in the field of computer security, computer network security, data security and Internet security; printed instructional, educational and teaching materials, each featuring topics in the field of computer security, computer network security, data security and Internet security; the aforesaid goods in particular for computer security, computer network security, data security and Internet security in the field of energy supply, energy supply networks, and energy supply components; the aforesaid goods in the field of power supply systems;
SECUREDIAL RDSK, INC. 17861 CARTWRIGHT ROAD IRVINE CA 92620 Computer hardware and computer security software for information access control, secure communications, electronic signature verification, accessing remote computers via dial-in links, computer software for integrating computer hardware components;SECURE DIAL;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.