COMPUTER SOFTWARE PREVENTING UNAUTHORIZED

Brand Owner (click to sort) Address Description
HIDE FOLDERS Sheludko, Igor 15 Petrovskaya st. apt. 79 Taganrog 347900 Russian Federation Computer software for preventing unauthorized users from accessing the computer data, files and folders located on storage devices;FOLDERS;
HIDE FOLDERS Karsyan, Michael 20/6 P.Toliatti st. apt. 20 Taganrog 347931 Russian Federation Computer software for preventing unauthorized users from accessing the computer data, files and folders located on storage devices;FOLDERS;
PERVASIVE SECURITY SYSTEMS SecretSEAL, Inc. 535 Middlefield Road, Suite 100 Menlo Park CA 94025 COMPUTER SOFTWARE FOR PREVENTING UNAUTHORIZED ACCESS TO ELECTRONIC DATA;
PSS PSS SYSTEMS, INC. 2471 E BAYSHORE RD SUITE 600 PALO ALTO CA 94303 COMPUTER SOFTWARE FOR PREVENTING UNAUTHORIZED ACCESS TO ELECTRONIC DATA;ISSUE NEW CERTIFICATE TO: PSS SYSTEMS, INC., 2471 E. BAYSHORE RD., SUITE 600, PALO ALTO, CA 94303, A DELAWARE CORPORATION;
PSS PSS SYSTEMS, INC. 2471 E BAYSHORE RD SUITE 600 PALO ALTO CA 94303 COMPUTER SOFTWARE FOR PREVENTING UNAUTHORIZED ACCESS TO ELECTRONIC DATA;ISSUE NEW CERTIFICATE TO: PSS SYSTEMS, INC., 2471 E. BAYSHORE RD., SUITE 600, PALO ALTO, CA 94303, A DELAWARE CORPORATION;PERVASIVE SECURITY SYSTEMS;
SAFELOCK Trend Micro Devices, Inc. Suite D100 2421 W. 205th Street Torrance CA 90501 computer software for preventing unauthorized computer access to hard drives;SAFE LOCK;
SECURESELECT Entercept Security Technologies, Inc. 2460 Zanker Road San Jose CA 95131 Computer software for preventing unauthorized intrusions into computer networks;SECURE SELECT;
TELEPORT Gravitational, Inc. 1611 Telegraph Avenue, 14th Floor Oakland CA 94612 Computer software for preventing unauthorized access to computer networks, for providing encrypted and secure data communications in computer networks, for providing identification and authentication in computer networks, for managing, installing, updating and removing of software in computer networks, and for monitoring, controlling and managing of computer systems used for encrypted and secure communications; computer software for use in managing internal server infrastructure, storage and network workloads, data centers and private clouds;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Systems and methods for preventing the unauthorized access to data stored on removable media, such as software, include storing a predetermined signature in the area of non-volatile memory in a computer system. Upon initialization of the computer system, a check is made to verify the signature. Only if the signature is verified will decoding software operate.