E SECURITY

Brand Owner (click to sort) Address Description
E-SECURITY SECURITY DYNAMICS TECHNOLOGIES, INC. 20 Crosby Drive Bedford MA 01730 E SECURITY;Providing consultation, information, installation, and technical assistance for computer hardware and computer software applications;
ESECURITY Ultrak, Inc. 1301 Waters Ridge Drive Lewisville TX 75057 E SECURITY;distribution of personal and home protection and safety products;
ESECURITY Amry, Khalid M. 8884 Ashgrove House Lane Vienna VA 22182 E SECURITY;Computer security services solution provider, namely a solution for monitoring the security status of computer networks and generating security responses based on network intrusion alerts; managing the scope of network intrusions processed by computer network security systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace. In another embodiment, subgroups called "tribes" can be formed within a telespace and each tribe adopts the security level of the telespace in which it resides.