COMPUTER PROGRAMMES USED CREATE

Brand Owner Address Description
OFFECCT LIFECIRCLE Offecct AB Box 100 Tibro SE-54321 Sweden Computer programmes used to create visualizations of three dimensional designs and graphic renderings of interior home and office spaces for use in interior design and layout of furniture; Computer programmes for use in relation to interior design, furniture, furnishings, and parts for these goods, namely, software for measuring sound in rooms;Installation services and repair/maintenance of furniture and furnishings;OFFECCT LIFE CIRCLE;Financing services; evaluation of repair fees; valuation of furniture and furnishings;Advertising and promotion; data entry and processing; compilation of data and information into databases; systematization of data and information in databases; business information services relating to data and information in databases; providing commercial information relating to companies; online retail store services via Internet and computer networks featuring furniture, furnishings and parts for these goods;Furniture; Furniture for use in interior design; furniture parts; furniture fittings, not of metal; goods made of wood, cork, cane, wicker or substitutes for these materials, or made of plastic, namely, furniture parts, furniture for use in interior design furniture and parts and fittings thereof;Design and development of software; design of furniture and furnishings;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method is disclosed for securely updating system attributes of a client computer with a BIOS and includes signing a public key of a secure server with a private key of the BIOS prior to completion of manufacturing of the client computer to create an encrypted public key and embedded private key stored at the server. The method includes receiving at the server a request packet transmitted from the client computer requesting system attribute modification, encrypting the request packet to create an encrypted packet, and transmitting a return packet to client computer comprising the encrypted packet, the server's public key, and server instructions. The client computer decrypts the request packet using the server's public key and compares it to the original request packet, and if identical, executes the server instructions to modify the client computer's boot block to update client computer's system attributes.