COMPUTER SOFTWARE ALLOWING END

Brand Owner (click to sort) Address Description
CRYPTOEASE Digital Arts Inc. OTEMACHI FIRST SQUARE, WEST TOWER 14F, 1-5-1,, OTEMACHI, CHIYODA-KU TOKYO Japan Computer software for allowing end users through their personal and mobile computing devices to apply persistent protection to files by encrypting a file and requiring authorized recipient(s) to use computer software in order to decrypt and access a file according to file usage restrictions; Software for enabling end users through their personal and mobile computing devices to be able to securely exchange information with a file security system and associate file data encryption and file usage restrictions on a per file basis, without requiring the end user to remember multiple passwords and with reduced key management administration;CRYPTO EASE;
CRYPTOEASE FinalCode, Inc. 645 University Avenue Palo Alto CA 94008 Computer software for allowing end users through their personal and mobile computing devices to apply persistent protection to files by encrypting a file and requiring authorized recipient(s) to use computer software in order to decrypt and access a file according to file usage restrictions; Software for enabling end users through their personal and mobile computing devices to be able to securely exchange information with a file security system and associate file data encryption and file usage restrictions on a per file basis, without requiring the end user to remember multiple passwords and with reduced key management administration;CRYPTO EASE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An integrated hardware and software monitoring system for a remote computer includes an event monitoring module loaded on the remote computer. The event monitoring module includes a hardware event detector that detects hardware events on the remote computer that may need attention, and a software service detector that detects status of software running on the remote computer to determine if any of the software has failed or is not operating properly, and to output a software event as a result thereof. The monitoring system also includes a data transmission system for performing a data transmission so as to notify a support specialist over a network connection of a hardware event or software event detected by the event monitoring module. The monitoring system further includes a graphical user interface provided on a display of the remote computer for allowing a user of the remote computer to make selections as to which software services and hardware events are to be detected.