COMPUTER PROGRAMS SECURITY

Brand Owner (click to sort) Address Description
INSIM SIERRA WIRELESS SA 24 Boulevard des Îles Issy-les-Mouline 92130 France Computer programs for security and secure user authentication; operating system software for computers, chips and smart cards; operating programs and systems for computers, chips and smart cards, industrial equipment transmitting data via wireless telecommunication network containing a SIM card or a chip; operating software for computer servers, printed circuits for smart cards; microcircuits; microprocessors, secure microprocessors; telephone network access, access control, identification and authentication devices for security and secure user authentication and data transmission; telephone apparatus; vending machines; readers and programmers for chips and smart cards; remote-control apparatus and devices for use with identification and authentication devices, namely, chips or smart cards for accessing or controlling access to apparatus and equipment, identification and authentication devices, namely, chips or smart cards for data processing, apparatus and equipment for accessing telephone networks, telephone network access, access control, identification and authentication devices for security and secure user authentication and data transmission for transferring, recording, reading and reproducing computer sound, images and data; integrated circuits, integrated circuit chips, microprocessors, semiconductors, central processing units with semiconductors, central processing unit chips with semiconductors, electronic memory units for storage and transmission of secured data, printed circuits, electric storage batteries, memory card readers; all for wireless enabled devices;IN SIMULATION;Color is not claimed as a feature of the mark.;
NEXTHINK Nexthink SA Chemin du Viaduc 1 CH-1008 Prilly Switzerland Computer programs for the security of computing networks and computer networks, user authentication, detecting intrusion, analysing user behaviour and presenting user behaviour on computing networks in graphic and text form;NEXT THINK;[ Design, development, and rental of computers and software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form; ] Installation, updating, and maintenance of software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form;
NEXTHINK NEXThink S.A. Parc Scientifique, PSE-B CH-1015 Lausanne Switzerland Computer programs for the security of computing networks and computer networks, user authentication, detecting intrusion, analysing user behaviour and presenting user behaviour on computing networks in graphic and text form;NEXT THINK;[ Design, development, and rental of computers and software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form; ] Installation, updating, and maintenance of software for the security of computing networks and computer networks, user authentication, detecting intrusion, analyzing user behavior and presenting user behavior on computing networks in graphic and text form;
OOKEYMAN TECSEC INCORPORATED 1953 Gallows Road, Suite 220 Vienna VA 22108 computer programs for security and privacy of files and data on a computer system or network;
OOKEYMAN TecSec, Inc. Suite 100 12950 Worldgate Drive Herndon VA 20170 computer programs for security and privacy of files and data on a computer system or network;OOKEY MAN;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system includes various security measures to insure that semi-permanent operating programs, such a boot blocks and firmware, are updated properly. For example, the system may include a security switch that can enable a host computer to load a replacement program into another computer, such as an appliance server for example, if the other computer fails. Also, if a replacement program is being loaded over a network connection that fails, the loading can resume automatically after re-establishment of the network connection. In addition, certain programs, such as boot blocks, may be verified in an execution memory, such as RAM, and loaded into a more permanent storage memory, such as ROM, only if verified.