ELECTRICAL LOCKS ELECTRONIC SECURITY

Brand Owner (click to sort) Address Description
INSITE MEDECO SECURITY LOCKS, INC. P.O. Box 3075 Salem VA 24153 electrical locks and electronic security systems comprising reading devices, PIN keyboards, keys, key programming devices, access cards, door monitoring devices, electro-mechanical locking devices, alarms, and computer controlled logic programs with appropriate interface devices;insight;
INSITE MEDECO SECURITY LOCKS, INC. P.O. Box 3075 Salem VA 24153 electrical locks and electronic security systems comprising reading devices, pin keyboards, keys, key programming devices, access cards, door monitoring devices, electro-mechanical locking devices, alarms, and computer-controlled logic programs with appropriate interface devices;
OFFSITE MEDECO SECURITY LOCKS, INC. P.O. Box 3075 Salem VA 24153 electrical locks and electronic security systems comprising reading devices, keyboards, keys, programming devices, access cards, door monitoring devices, electro-mechanical locking devices, alarms and computer-controlled logic programs with appropriate interface devices to allow a user to program, monitor, and report on security systems from a remote location;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for recovering previously activated security profiles utilizes memory and a security application. Initially, the security application enables a user to define a first security profile. After defining the first security profile, the user submits a request for activating the first security profile, and in response, the security application modifies a machine state of the computer system. The modification of the machine state in response to this request locks down the computer system, thereby implementing the first security profile defined by the user. Also in response to the request for activating the first security profile, the security application stores, in the memory, data indicative of the machine state so that the first security profile can be again implemented at a later time, if desired. In this regard, after causing a different security profile to be implemented by the computer system, a user may submit a request for changing the security profile of the computer system back to the first security profile. In response to such a request, the security application retrieves the data previously stored in the memory and automatically modifies the machine state so that the first security profile is again implemented by the computer system. As a result, any changes made to the security profile of the computer system since the submission of the aforementioned request for activating the first security profile are effectively nullified.