COMPUTER SECURITY HARDWARE COMPRISING LOCKS

Brand Owner (click to sort) Address Description
ABA ABA LOCKS INTERNATIONAL CO., LTD. 3 F., NO. 649-8, ZHONGZHENG RD. XINZHUANG DIST. NEW TAIPEI CITY 24257 Taiwan Computer security hardware comprising locks, keys and cables; Electric locks; Electronic locks; and Anti-intrusion alarms;Metal locks and keys therefor; Door hardware, namely keys and key cylinders; and Metal bicycle locks;ANTITHEFT BURGLAR ALARMS;Color is not claimed as a feature of the mark.;Anti-theft locks for use on automobile steering wheels; Steering wheel locks; Antitheft alarms for vehicles; and Burglar alarms for vehicles;
ABA UFO INTERNATIONAL CORP. 1F., No. 651-6, Chung Cheng Rd. Hsin Chuang City, Taipei Hsien Taiwan Computer security hardware comprising locks, keys and cables; Electric locks; Electronic locks; and Anti-intrusion alarms;Metal locks and keys therefor; Door hardware, namely keys and key cylinders; and Metal bicycle locks;ANTITHEFT BURGLAR ALARMS;Color is not claimed as a feature of the mark.;Anti-theft locks for use on automobile steering wheels; Steering wheel locks; Antitheft alarms for vehicles; and Burglar alarms for vehicles;
PDA LEASH ACCO BRANDS CORPORATION Four Corporate Drive Lake Zurich IL 60047 COMPUTER SECURITY HARDWARE COMPRISING LOCKS AND CABLES;PDA;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for recovering previously activated security profiles utilizes memory and a security application. Initially, the security application enables a user to define a first security profile. After defining the first security profile, the user submits a request for activating the first security profile, and in response, the security application modifies a machine state of the computer system. The modification of the machine state in response to this request locks down the computer system, thereby implementing the first security profile defined by the user. Also in response to the request for activating the first security profile, the security application stores, in the memory, data indicative of the machine state so that the first security profile can be again implemented at a later time, if desired. In this regard, after causing a different security profile to be implemented by the computer system, a user may submit a request for changing the security profile of the computer system back to the first security profile. In response to such a request, the security application retrieves the data previously stored in the memory and automatically modifies the machine state so that the first security profile is again implemented by the computer system. As a result, any changes made to the security profile of the computer system since the submission of the aforementioned request for activating the first security profile are effectively nullified.