ELECTRIC APPARATUS THEIR MODULES

Brand Owner (click to sort) Address Description
CONDIMAT Atotech Deutschland GmbH & Co. KG Kommanditgesellschaft (limited partnership) Erasmusstr. 20 10553 Berlin Germany Electric apparatus and their modules, namely, electrolysis apparatus for electroplating purposes for use in surface treatment of metals, polymers and semiconductors;Machines for use in surface treatment of metals, polymers and semiconductors; machines for galvanizing; machines for manufacture of electronic components; apparatus for galvanizing, namely, galvanizing machines featuring mixing, filtering, spraying, bath-plating machines and pumping functions;
ELEVEN ATOTECH DEUTSCHLAND GMBH Erasmusstrasse 20 Berlin 10553 Germany Electric apparatus and their modules for surface treatment of metals, smiconductor material and polymers, particularly for use in the field of galvano plating; Electrodialysis device for recovery of electroless nickel plating processes;Chemicals used in surface treatment of metals, semiconductor material and polymers, particulary for galvano plating; galvanizing baths, galvanizing preparations; tempering and soldering preparations; Chemicals for electroplating processes and electroless nickel plating processes in the decorative and fuctional surface finishing industry;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computing apparatus comprises a plurality of hardware modules (102,104,106) and a shared communication infrastructure (110) by which the modules can communicate with each other in the usual way. In order to increase the level of trust and security in the apparatus, a trusted hardware module (120) is also provided and is connected to the other modules by respective communication paths (122a;122b;122c), distinct from the communication infrastructure, by which each of those modules can communicate directly with the trusted module but cannot communicate directly with any other of the modules. The trusted module can therefore have secure communications, for example of "unsafe" data, with each of the other modules without any of the remaining modules eavesdropping, and the trusted module can route unsafe data between any pair of the other modules, or decline to provide such routing, for example in dependence on policy stored in the trusted module.