ELECTRONIC SECURITY SYSTEM COMPRISING COMPUTER

Brand Owner (click to sort) Address Description
ATHENA GATEKEEPER SYSTEMS, INC. 90 Icon Lake Forest CA 92610 Electronic security system comprising computer hardware, computer software, transmitters, receivers, and circuitry, for monitoring, tracking, managing, and preventing theft of mobile assets, in the nature of human and non-human propelled vehicles, mobility carts, shopping carts; alarm monitoring systems for use with mobile assets in the nature of human and non-human propelled vehicles, mobility carts, shopping carts; radio transmitters for use with mobile assets; radio transmitters for use with computer hardware and software systems for controlling theft alarms, and security alarms for mobile assets; anti-theft alarms and sensors for mobile assets; computer hardware and software for monitoring, detecting, and tracking the location of mobile assets; security alarm controllers for use with mobile assets; wireless controllers for monitoring mobile assets; electrical and scientific apparatus, namely, computer hardware and software systems for estimating the location of mobile assets; wireless computer hardware and software systems for monitoring, tracking, and locating mobile assets; electrical and scientific apparatus comprised of computer hardware and software for estimating the location of mobile assets; electrical and scientific apparatus and devices used for dead reckoning modules for calculating the position of mobile assets, namely, electronic mobile sensors, dead-reckoning positioning accelerometers and magnetometers, and digital signal processors; computer hardware and software for commercial use for monitoring, tracking, managing, and preventing theft of mobile assets; anti-theft system comprising computer hardware and software for controlling locking devices for mobile assets; electrical and scientific anti-theft systems, comprising computer hardware and software for tracking mobile assets and personal mobility carts; Geofencing apparatus in the nature of electronic fences; computer operating hardware and software for electronic fences; dead reckoning modules for calculating the position of mobile assets; dead-reckoning positioning systems consisting primarily of electronic mobile sensors and digital signal processors for calculating the position of mobile assets; electronic device for tracking and locating mobile assets using dead reckoning devices; electronic device for tracking and locating mobile assets, in the nature of human and non-human propelled vehicles, mobility carts, shopping carts; portable module consisting primarily of sensors for mobile assets, in the nature of human and non-human propelled vehicles, mobility carts, shopping carts; anti-theft alarms for motorized and non-motorized vehicles or mobility carts; all of the aforementioned goods used by retail stores to locate, track, and prevent theft of shopping carts, and mobility carts used by patrons;
SOUNDTASK WALSH, CHRISTOPHER S. 303 FALUNG CREEK ROAD FREDERICKSBURG VA 22401 ELECTRONIC SECURITY SYSTEM COMPRISING COMPUTER HARDWARE AND COMPUTER SOFTWARE FOR GENERATING AUDIO SOUNDS WHICH MUST BE IDENTIFIED AS PART OF AN INTERROGATION PROCESS BY ONE ATTEMPTING TO GAIN ACCESS TO SENSITIVE MEDICAL INFORMATION, IN THE HEALTHCARE INDUSTRY;SOUND TASK;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.