COMPUTER SOFTWARE DISK ENCRYPTION

Brand Owner (click to sort) Address Description
BECRYPT BeCrypt Limited 11-19 Artillery Row 4th Floor Artillery House London SW1P1RT United Kingdom Computer software for disk encryption, media encryption and data protection; computer programs for disk encryption, media encryption and data protection; downloadable electronic publications, namely, books, journals, magazines, newsletters, pamphlets, guides, articles, information documents, forms, relating to disk encryption, media encryption and data protection;BE CRYPT;Color is not claimed as a feature of the mark.;IT consultancy services; computer consultancy services; computer software consultancy; computer hardware consultancy; computer programming; computer systems design and development; computer systems analysis; design, creation and development of computer software; leasing, rental and hire of computer software; licensing of computer software; maintenance, updating and upgrading of computer software for others; technical support services, namely, troubleshooting of computer software problems; design of data processing systems and data processing networks; conducting feasibility studies; conversion of data or documents from physical to electronic media; information, advisory and consultancy services relating to all the aforesaid services;
BECRYPT BeCrypt Limited 11-19 Artillery Row 4th Floor Artillery House London SW1P1RT United Kingdom Computer software for disk encryption, media encryption and data protection; computer firmware for disk encryption, media encryption and data protection; computer programs for disk encryption, media encryption and data protection; [ digital media receivers, digital media servers, digital media streaming devices, ] digital media, namely, CDs, DVDs, downloadable audio and video files, disk drives, USB devices, SDs and external portable hard drives relating to disk encryption, media encryption and data protection; electronic databases in the field of disk encryption, media encryption and data protection recorded on computer media; downloadable electronic publications, namely, [ books, journals, magazines, newsletters, ] pamphlets, guides, articles, information documents, forms, relating to disk encryption, media encryption and data protection;BE CRYPT;Licensing of computer software;[ IT consultancy services; ] computer security consultancy services; computer programming consultancy services; computer programming; computer software consultancy; [ computer hardware consultancy; computer hardware and software design; ] design and development of computer operating systems [ and computer hardware platforms ]; computer systems analysis; [ research, design and development of computer software; ] rental of computer software; maintenance, updating and upgrading of computer software; computer software support services, namely, troubleshooting of computer software problems; [ design of data processing networks; data network services, namely, providing search engines for obtaining data on a global computer network; ] conducting feasibility studies [; conversion of data or documents from physical to electronic media; information, advisory and consultancy services relating to all the aforesaid services ];
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention provides an input and output device for computer system storage that can prevent a computer system being fatally damaged by a computer virus, and also provides a software execution method that by using the input and output device, enables trial software, trial data and mail data to be safely tried. For this, a virtual computer system is used that runs on a computer system. Writes to a hard disk in the virtual computer system are made via a disk cache, and whether or not data is transferred from the disk cache to the hard disk is controlled. Application program snapshot data created by the computer system is recorded on a recording medium that is substantially read-only or transmitted to a different computer system. The snapshot data from the recording medium is read or received by the different computer system and a processing by the application program is resumed in the state in which data transfer from the disk cache to the first storage has stopped.