COMPUTER SECURITY MANAGEMENT SOFTWARE

Brand Owner (click to sort) Address Description
ITG LINK ITG SOFTWARE, INC. 1810 14th Street Suite 208A Santa Monica CA 90404 COMPUTER SECURITY MANAGEMENT SOFTWARE; COMPUTER SOFTWARE FOR SINGLE SIGN ON THROUGH SINGLE USER LOGIN; INSTALLATION, CONFIGURATION, TRAINING AND SUPPORT FOR SINGLE SIGN ON SOFTWARE;
PAPERLESS INK Paperless Ink Corporation 624 Chesterfield Circle San Marcos CA 92069 computer security management software, namely, software used for the support and relay, namely, function performed by intended software, office process automation, access control, digital certificate issuance, revocation, and management, client/server security, content filtering software, database security, database security, digital forensic analysis, disaster recovery/business continuity, e-mail security, e-commerce, encryption, enterprise security management, firewalls, Internet/intranet-security controls, intrusion detection systems, isp services, java/activex security, lan/wan security, mainframe security, managed security, modem sweepers, network/ communications security, security administration, single sign-on, smart cards, virtual private nets, virus protection, wireless/mobile security;PAPERLESS;
THE E-FORMS COMPANY Linlor, James D. 1939 Rock Street #12 Mountain View CA 94043 computer security management software, namely, software used for the support, and relay of electronic identities and for use in providing privacy, access and data modification control, verification of data originality, authenticity, and approval in-whole or in-part for use in a particular situation; system integrity, digital signature, security alarm and authentication services, for data content, data communications across operating environments, multiple computer platforms and network protocols; software that uses a public key directory service; software that provides full and file level encryption and digital signature over personal computer, workstation, local area network and mainframe environments; computer run-time software applications, namely, e-forms, e-mail, remote access, message servers, and Web browsers; computer software used to facilitate electronic commerce and secure forms transmittal on networks and global computer networks, namely, financial electronic document, file and transaction interchanges; E-forms and E-mail communications software; database access programs; agent programs;THE E FORMS COMPANY; THE ELECTRONIC FORMS COMPANY;
THE SOURCE FOR INTERNET FORMS Linlor, James D. 1939 Rock Street #12 Mountain View CA 94043 COMPUTER SECURITY MANAGEMENT SOFTWARE, NAMELY, SOFTWARE USED FOR THE SUPPORT AND RELAY, NAMELY, FUNCTION PERFORMED BY INTENDED SOFTWARE, OFFICE PROCESS AUTOMATION, ACCESS CONTROL, DIGITAL CERTIFICATE ISSUANCE, REVOCATION, AND MANAGEMENT, CLIENT/SERVER SECURITY, CONTENT FILTERING SOFTWARE, DATABASE SECURITY, DATABASE SECURITY, DIGITAL FORENSIC ANALYSIS, DISASTER RECOVERY/BUSINESS CONTINUITY, E-MAIL SECURITY, E-COMMERCE, ENCRYPTION, ENTERPRISE SECURITY MANAGEMENT, FIREWALLS, INTERNET/INTRANET-SECURITY CONTROLS, INTRUSION DETECTION SYSTEMS, ISP SERVICES, JAVA/ACTIVEX SECURITY, LAN/WAN SECURITY, MAINFRAME SECURITY, MANAGED SECURITY, MODEM SWEEPERS, NETWORK/ COMMUNICATIONS SECURITY, SECURITY ADMINISTRATION, SINGLE SIGN-ON, SMART CARDS, VIRTUAL PRIVATE NETS (VPNs), VIRUS PROTECTION, WIRELESS/MOBILE SECURITY;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for controlling integrity measurement of an un-trusted system component on a client system includes a trusted management utility configured to measure the integrity of the un-trusted system component, a trusted fixed token resident on the client system, and a trusted registration service. The trusted registration service creates a signed hash of the trusted management utility software and stores the signed hash of the trusted management utility software in the trusted fixed token. The trusted registration service creates a security domain and stores the security domain in the trusted fixed token. The trusted fixed token creates a signed hash of the trusted management utility software and the security domain, and securely communicates the signed hash of the trusted management utility software and the security domain to the trusted registration service. The trusted management utility software is installed on the client system and executed to gather integrity measurements on the un-trusted system component. A hash of the un-trusted system component and the trusted management utility software is created and stored in the trusted fixed token. This data may be combined with the security domain. The hash of the un-trusted system component, the trusted management utility software, and the security domain may be interrogated by the trusted registration service to verify the integrity of the un-trusted system component.