ELECTRONIC SECURITY DEVICES USE

Brand Owner (click to sort) Address Description
INVUE INVUE SECURITY PRODUCTS, INC. 15015 Lancaster Highway Charlotte NC 28277 Electronic security devices for use in retail stores, namely, [ garment alarms, ] line alarms, free standing alarm modules, alarm module stands, and cabinet alarms;IN VIEW;
IR ECOSYSTEM INVUE SECURITY PRODUCTS INC. 9201 Baybrook Lane Charlotte NC 28277 electronic security devices for use in retail stores, namely, alarming displays, line alarms, free standing alarm modules, alarm module stands, cabinet alarms, cabinet locks, showcase locks, and drawer locks, and electronic keys for operating with said devices;IR ECO SYSTEM;IR;
IR ECOSYSTEM INVUE SECURITY PRODUCTS INC. 9201 Baybrook Lane Charlotte NC 28277 electronic security devices for use in retail stores, namely, electronic locks for display hooks, tethers, storage containers, and cable wraps for securing goods against theft;IR ECO SYSTEM;
TAUTUK Tautuk 35 North Main Street, Suite 200 Jasper GA 30143 Electronic security devices for use in monitoring for and detecting security threats or cybersecurity threats and alerting users in real-time;Platform as a service (PAAS) featuring computer software platforms for use in monitoring for and detecting security threats or cybersecurity threats and alerting users in real-time; Software as a service (SAAS) services featuring software for use in monitoring for and detecting security threats or cybersecurity threats and alerting users in real-time; Computer security threat analysis for protecting data by monitoring for and detecting security threats or cybersecurity threats and alerting users in real-time; Computer security vulnerability analysis; Consultancy in the fields of internet security, data security, computer security, and cyber security; Monitoring and testing computer terminals, servers, networks and end points directed toward the detection of security threats and cybersecurity threats; Collaborative computer programming for others in the nature of hackathons; Providing information in the fields of technology and software development via an on-line website; Technology consultation in the field of security threats and cybersecurity threats; Cyber resiliency advisory services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The electronic wallet system comprises a plurality of devices interconnected through a local network and capable of conducting electronic business transactions on an open network. Each device contains a smart card reader. A plurality of smart cards represent electronic purses able to contain electronic money. One of the devices contains an entity, the server, which contains a list of data entries, each entry corresponding to a purse liable to receive electronic money, contained in tokens, from other purses of the system. The tokens transferred between purses are stored temporally by the server. In order to improve the security of the transactions, the messages which are exchanged between the devices and/or the smart cards during token transfer operations are protected by secret keys which are only stored in the smart cards of the system.