DATA ENCRYPTION DECODING SERVICES

Brand Owner (click to sort) Address Description
BEYOND ENCRYPTION Secured2 Corporation 6160 Summit Drive North, Suite 345 Minneapolis MN 55430 Data encryption and decoding services; Data encryption services; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Computer services, namely, encrypted data recovery services;
CRYPTOMNIUM Cryptomnium 923 Peachtree Street NE Unit 930 Atlanta GA 30309 Data encryption and decoding services; Providing a secure electronic online system featuring technology which allows users to transmit, receive and verify receipt of encrypted information;
ECHO ENCRYPTION STANDARD Clandestine Reporters Working Group 3101 N Hampton Dr, Unit 1119 Alexandria VA 22302 Data encryption and decoding services; Data encryption services;
ENCYRO Encyro Inc. Suite 111-419 420 N McKinley St. Corona CA 92879 Data encryption and decoding services; Providing temporary use of on-line non-downloadable software for sending and receiving secure emails and electronic files, storing and managing electronic files, and tracking when emails and electronic files are received, viewed, and downloaded; Providing temporary use of a web-based software application for sending and receiving secure emails and electronic files, storing and managing electronic files, and tracking when emails and electronic files are received, viewed, and downloaded; Software as a service (SAAS) services featuring software for sending and receiving secure emails and electronic files, storing and managing electronic files, and tracking when emails and electronic files are received, viewed, and downloaded;
ITSIVE Rudolf Eyrich 1304 Langham Creek Houston TX 77035 Data encryption and decoding services; Data migration services; Database design and development; Database development services; Information technology consulting services; Development, updating and maintenance of software and database systems; Digital compression of computer data; Rental of a database server to third parties;
POLY-ANONYMIZATION ANONOMATIC, INC 14 DUBLIN CT. PLEASANT HILL CA 94523 Data encryption and decoding services; Data encryption services; Design and development of computer software for data security; Electronic data storage; Remote online backup of computer data;
POLY-ANONYMIZATION Taveren, Inc. 101 Gregory lane ste 46 Pleasant Hill CA 94523 Data encryption and decoding services; Data encryption services; Design and development of computer software for data security; Electronic data storage; Remote online backup of computer data;
Q KEY Kyle Lussier 3085 Applewood Drive SW Marietta GA 30064 Data encryption and decoding services;
TAVEREN Taveren, Inc 14 Dublin Court Pleasant Hill CA 94523 Data encryption and decoding services; Data encryption services; Design and development of computer software for data security; Electronic data storage; Remote online backup of computer data;
UNITSEC Unitsec Inc 2724 Rushing Brook Ln Herndon VA 20171 Data encryption and decoding services; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A shift device for shifting a first place of a data word, which consists of a plurality of places, to a second place so as to obtain a shifted data word, wherein the first place is encrypted using a first encryption parameter and wherein the second place is encrypted using a second encryption parameter, includes a unit for shifting the first place of the data word to the second place of the data word, a unit for re-encrypting the first place from an encryption using the first encryption parameter into an encryption using the second encryption parameter, and a control for controlling the unit for shifting and the unit for re-encryption so that the first place is first shifted to the second place and is then re-encrypted, or that the first place is first re-encrypted and is then shifted to the second place. This ensures that data encrypted either with the first encryption parameter or with the second encryption parameter are always shifted, thus making it harder for attackers to eavesdrop on clear text data.