ELECTRONIC ENABLED AVIATION INFORMATION SECURITY

Brand Owner Address Description
E-ENABLED AVINFOSEC Air Informatics 800 Fifth Avenue, S101-291 Seattle WA 98104 ELECTRONIC ENABLED AVIATION INFORMATION SECURITY;Computer services, namely, acting as an application service provider in the field of digital data, information and knowledge management to host computer application software for the collection, delivery, editing, analysis, organizing, modifying, book marking, transmission, storage and sharing of data and information in the field of the content management, safety, quality, logistics, supply chain, parts delivery, operation of aircraft systems, aircraft and other vehicles; remote data management for wired and wireless delivery and receipt of digital information, data, files, logs, reports, security, safety, flight and aircraft data and information for use off and on-board an aircraft or vehicle, and in the management and operation of aircraft and other vehicles; remote data management and analysis for wireless delivery and receipt of updated computer applications, databases, logs, reports, files, embedded software to aircraft and other vehicles for the purpose of the management, safety, security, logistics, supply chain, parts delivery, quality assurance and operation of an aircraft or other vehicle; providing online non-downloadable software for the purpose of management, quality, analysis, operation, safety and security of an aircraft or other vehicle; quality assurance and analysis service provider, namely, providing, managing, maintaining and hosting analysis software in the field of aircraft and vehicle management and operations and remote data management, analysis, data transfer, data synchronization, and data communication for the wireless delivery of data and software related to and from an aircraft and other vehicles; providing technology information updates for information, quality and safety systems via the global computer network; computer security service, namely, restricting access to and by computer networks to cyber risks, threats and vulnerabilities, scanning and prevention penetration by unauthorized computers, networks, individuals and organizations, computers and networks to prevent information security vulnerability;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.