COMPUTER SOFTWARE ELECTRONIC INFORMATION

Brand Owner (click to sort) Address Description
GENEALOGICAL RESEARCH SYSTEM Automated Archives, Inc. 1160 South State Street, Suite 250 Orem UT 84058 computer software for electronic information database management and instruction manuals sold therewith;SYSTEM;
GRS Automated Archives, Inc. 1160 South State Street, Suite 250 Orem UT 84058 computer software for electronic information database management and instruction manuals sold therewith;
ICL INFORMATIONBROKER INTERNATIONAL COMPUTERS LIMITED Hertfordshire computer software for electronic information management and communication purposes, namely, computer software for database management, loading and searching of data, logging and billing access time to a database, monitoring and providing security of access to a database, and for enabling communications between a database and facilities provided on the global computer network or other telecommunications network;INFORMATIONBROKER;
KNOWLEDGESENTRY KNOWLEDGESENTRY.NET 535 North Pleasantburg Drive Suite 210 Greenville SC 29607 Computer software for electronic information security and information and information technology, namely intrusion detection, prevention and investigation and forensics services, anti-virus protection, content filtering, electronic cookie detection, electronic mail and packet scanning, firewall port monitoring and security appliance monitoring for use in computer system and networks, namely the remote access and internet connections and continuous namely the remote access and internet connections and continuous offsite monitoring of such system and networks;KNOWLEDGE SENTRY;Software consulting services in the field of electronic information security and information technology software, namely intrusion detection, prevention and investigation and forensics services, anti-virus protection, content filtering, electronic cookie detection, electronic mail and packet scanning, firewall port monitoring and security appliance monitoring for use in computer systems and network, namely the remote access and internet connections, and continuous offsites monitoring of such systems and networks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An invention for electronic file protection using location and other entropy factors is provided. Environment information regarding a computer is obtained, wherein the environment information includes data concerning an operating environment of the computer. Based on the environment information, an encryption key is generated and an electronic file is encrypted using the encryption key. A decryption key can also be created based on environment information, wherein the decryption key can be utilized to decrypt the electronic file. In addition, the environment information can include location information of the computer, drive information regarding a drive wherein the electronic file will be stored, and time information specifying access duration.