COMPUTER SOFTWARE SECURITY PURPOSES

Brand Owner (click to sort) Address Description
DOORS TO DATABASES AND GATES TO GATEWAYS JERICHO SYSTEMS CORPORATION Suite 250 6600 LBJ Freeway Dallas TX 75240 Computer software for security purposes, namely, for controlling access to specified areas;
INDOMIT Aguirre, Mikel Gotzon Urizarbarrena Buenos Aires, 12 48001 Bilbao Spain Computer software for security purposes in the control of work stations; computer software for the automatic management of the inventory of computer hardware; and computer software for the detection and elimination of computer viruses;Computer programming for others;
INTRUSIC Intrusic, Inc. 330 Bear Hill Road Waltham MA 02451 Computer software for security purposes;
NEOEXEC Neovalens SA 66, route de Luxembourg L-4221 Esch/Alzette Luxembourg Computer software for security purposes; computer software for data security; computer software for creation and management of information Technology user groups and of information Technology network rights; integrated or integratable computer programs in so far as being extensions of the recorded operating systems for security purposes;Elaborating (conception), updating, maintaining, programming, installing and renting of computer software in connection with the management of computer network security, of information Technology user groups and of information Technology network rights; research and development of computer software in connection with the management of computer network security, of information Technology user groups and of information Technology network rights; application service provider (ASP) featuring software in the field of computer network security, of information Technology user groups and of information Technology network rights; providing temporary use of on-line non-downloadable software for computer programs in connection with the management of computer network security, of information Technology user groups and of information Technology network rights;
NETTOLL ENITION SA 13, RUE RENE JACQUES ISSY LES MOULINEAUX CEDEX France COMPUTER SOFTWARE FOR SECURITY PURPOSES, NAMELY ENCRYPTION, INTEGRITY PROTECTION, DIGITAL SIGNATURE, AUTHENTICATION AND REPUDIATION IN THE FIELDS OF CRYPTOLOGY AND COMPUTER TECHNOLOGY SECURITY;In the statement, Column 2, lines 11 through 14, should be deleted, and, Priority Claimed Under Sec. 44(D) on European Community Trademark Application No. 001357342, Filed 10-22-1999, Reg. No. 1357342, Dated 1-16-2001, Expires 10-22-2009.;PRINTED MATERIAL MADE OF PAPER, NAMELY PAMPHLETS, BROCHURES, NEWSLETTERS, JOURNALS, MAGAZINES, CATALOGUES REGARDING CRYPTOLOGY AND COMPUTER TECHNOLOGY SECURITY; AND MATERIAL RELATED TO COMPUTER HARDWARE INSTALLATION AND WORKING, NAMELY MANUALS REGARDING COMPUTER HARDWARE INSTALLATION AND OPERATION;PROVIDING MULTIPLE-USER ACCESS TO GLOBAL COMPUTER NETWORK;COMPUTER PROGRAMMING, AND MAINTENANCE AND UPDATING OF SOFTWARE, ALL PERFORMED FOR THE BENEFIT OF THE OTHERS;
NETTOLL Nettoll 143 bis, avenue de Verdun 92442 Issy Les Moulineaux Cedex France COMPUTER SOFTWARE FOR SECURITY PURPOSES, NAMELY ENCRYPTION, INTEGRITY PROTECTION, DIGITAL SIGNATURE, AUTHENTICATION AND REPUDIATION IN THE FIELDS OF CRYPTOLOGY AND COMPUTER TECHNOLOGY SECURITY;In the statement, Column 2, lines 11 through 14, should be deleted, and, Priority Claimed Under Sec. 44(D) on European Community Trademark Application No. 001357342, Filed 10-22-1999, Reg. No. 1357342, Dated 1-16-2001, Expires 10-22-2009.;PRINTED MATERIAL MADE OF PAPER, NAMELY PAMPHLETS, BROCHURES, NEWSLETTERS, JOURNALS, MAGAZINES, CATALOGUES REGARDING CRYPTOLOGY AND COMPUTER TECHNOLOGY SECURITY; AND MATERIAL RELATED TO COMPUTER HARDWARE INSTALLATION AND WORKING, NAMELY MANUALS REGARDING COMPUTER HARDWARE INSTALLATION AND OPERATION;PROVIDING MULTIPLE-USER ACCESS TO GLOBAL COMPUTER NETWORK;COMPUTER PROGRAMMING, AND MAINTENANCE AND UPDATING OF SOFTWARE, ALL PERFORMED FOR THE BENEFIT OF THE OTHERS;
PDA-PROTECT Transaction Security, Inc. 2 Franklin Tree Ct Catonsville MD 21228 computer software for security purposes, namely, software used in authenticating passwords for access to hand computers, phone-enabled hand held computers and computers enabled with stylus input;PDA PROTECT;
REST ASSURED JERICHO SYSTEMS CORPORATION Suite 250 6600 LBJ Freeway Dallas TX 75240 Computer software for security purposes, namely, for controlling access to specified computer resources based on the characteristics of the requester;
SECURE WORD Jan Zakowski 5777 W. Century Blvd. Suite #1790 Los Angeles CA 90045 computer software for security purposes;
THE CLUB WINNER INTERNATIONAL ROYALTY 32 West State Street Sharon PA 16146 COMPUTER SOFTWARE FOR SECURITY PURPOSES, NAMELY ENCRYPTION, INTEGRITY PROTECTION, FIREWALL, DIGITAL SIGNATURE, AUTHENTICATION AND REPUDIATION, COMPUTER VIRUS PROTECTION; GLOBAL COMPUTER NETWORK SECURITY SOFTWARE, NAMELY, SOFTWARE PROVIDING ELECTRONIC INFORMATION SECURITY THROUGH NETWORK POLICY AND SECURITY ASSESSMENT, ACCESS CONTROL, ENCRYPTION, FIREWALL, SECURE ELECTRONIC COMMERCE AND VIRUS PROTECTION;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.