COMPUTER UTILITY SECURITY SOFTWARE

Brand Owner (click to sort) Address Description
EMANAGER TREND MICRO INCORPORATED 225 E. John Carpenter Freeway, Ste. 1500 Irving TX 75062 computer utility and security software; computer software for e-mail management; instruction manuals supplied as a unit with the foregoing;
MIGO MIGO SOFTWARE, INC. 555 TWIN DOLPHIN DRIVE SUITE 650 REDWOOD CITY CA 94065 Computer utility and security software; computer software for deleting and/or blocking and/or filtering of unwanted email, advertisements, spam, viruses, and spyware; firewall computer software; computer software for monitoring, restricting and/or limiting children's use of computers and/or computer applications; computer software for data backup and recovering lost data; computer software for restoring computer systems and rescuing crashed computer systems; computer software for backup of computer programs and data; computer software for use in diagnosis, repair, and configuration of computers and user and instruction manuals sold therewith; computer software for managing, securing and deleting files and other data; computer software for searching internet sites; computer software for online privacy; computer network software for synchronizing a user's computer environment, settings and data with the user's alternative computer environment located elsewhere on a network; computer network software for synchronizing a user's computer environment, settings and data with a network repository and for subsequently synchronizing a user's computer environment, settings and data located on the network repository with (a) the user's alternative computer environment located elsewhere on a network, or (b) the user's original computer environment; computer software for synchronizing a user's computer environment, settings and data which uses a first email client with a user's alternative computer environment which uses a second email client; computer software for synchronizing and re-synchronizing two or more of a user's computer environment, settings and data; computer software for migrating data to an upgraded and/or new operating system; computer software for transferring computer settings, files, preferences and data to a new computer; data encryption and security software; computer software for permanently removing data from a hard drive; file deletion software;Operation of a network for others for the synchronization of a user's computer environment, settings, and data with the user's alternative computer environment located elsewhere on a network;Design of computer hardware, computer software, computer networks, and computer systems for others;
MIGO PowerHouse Technologies Group, Inc. Suite 650 555 Twin Dolphin Drive Redwood City CA 94065 Computer utility and security software; computer software for deleting and/or blocking and/or filtering of unwanted email, advertisements, spam, viruses, and spyware; firewall computer software; computer software for monitoring, restricting and/or limiting children's use of computers and/or computer applications; computer software for data backup and recovering lost data; computer software for restoring computer systems and rescuing crashed computer systems; computer software for backup of computer programs and data; computer software for use in diagnosis, repair, and configuration of computers and user and instruction manuals sold therewith; computer software for managing, securing and deleting files and other data; computer software for searching internet sites; computer software for online privacy; computer network software for synchronizing a user's computer environment, settings and data with the user's alternative computer environment located elsewhere on a network; computer network software for synchronizing a user's computer environment, settings and data with a network repository and for subsequently synchronizing a user's computer environment, settings and data located on the network repository with (a) the user's alternative computer environment located elsewhere on a network, or (b) the user's original computer environment; computer software for synchronizing a user's computer environment, settings and data which uses a first email client with a user's alternative computer environment which uses a second email client; computer software for synchronizing and re-synchronizing two or more of a user's computer environment, settings and data; computer software for migrating data to an upgraded and/or new operating system; computer software for transferring computer settings, files, preferences and data to a new computer; data encryption and security software; computer software for permanently removing data from a hard drive; file deletion software;Operation of a network for others for the synchronization of a user's computer environment, settings, and data with the user's alternative computer environment located elsewhere on a network;Design of computer hardware, computer software, computer networks, and computer systems for others;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for controlling integrity measurement of an un-trusted system component on a client system includes a trusted management utility configured to measure the integrity of the un-trusted system component, a trusted fixed token resident on the client system, and a trusted registration service. The trusted registration service creates a signed hash of the trusted management utility software and stores the signed hash of the trusted management utility software in the trusted fixed token. The trusted registration service creates a security domain and stores the security domain in the trusted fixed token. The trusted fixed token creates a signed hash of the trusted management utility software and the security domain, and securely communicates the signed hash of the trusted management utility software and the security domain to the trusted registration service. The trusted management utility software is installed on the client system and executed to gather integrity measurements on the un-trusted system component. A hash of the un-trusted system component and the trusted management utility software is created and stored in the trusted fixed token. This data may be combined with the security domain. The hash of the un-trusted system component, the trusted management utility software, and the security domain may be interrogated by the trusted registration service to verify the integrity of the un-trusted system component.