METAL SECURITY LOCKS

Brand Owner (click to sort) Address Description
BMS Business Machine Security, Inc. 510 W. Central Avenue, Unit A Brea CA 92821 METAL SECURITY LOCKS, METAL SECURITY LOCK CYLINDERS, METAL CABLE WIRES, MOUNTS AND ADJUSTABLE MOUNTS FOR METAL SECURITY LOCKS, METAL HARDWARE, NAMELY, ENCLOSURES FOR SECURITY LOCKS FOR USE WITH COMPUTER HARDWARE, SOFTWARE, PROJECTORS, LCD PROJECTORS, AUDIO EQUIPMENT, VIDEO EQUIPMENT, AUDIOVISUAL EQUIPMENT, AND ELECTRONIC EQUIPMENT;BUSINESS MACHINE SECURITY;
IBALL MASTER LOCK COMPANY Milwaukee WI metal security locks;I BALL;
SPHERO MASTER LOCK COMPANY 6744 South Howell Avenue Oak Creek WI 53154 metal security locks;
TACLOCK TRUCKVAULT, INC P.O. BOX 734 Sedro Woolley WA 98284 metal security locks;
THRIFTLOCK DETEX CORPORATION 302 Detex Drive New Braunfels TX 78130 metal security locks;THRIFT LOCK;
TYDENBROOKS E.J. BROOKS COMPANY 43045 West 9 Mile Road Novi MI 48375 METAL SECURITY LOCKS; METAL SECURITY SEALS FOR USE WITH CONTAINERS AND DOORS;TAMPER EVIDENT PLASTIC SECURITY SEALS FOR USE WITH CONTAINERS AND DOORS;TY DEN BROOKS;PLASTIC SECURITY LOCKS FOR PROVIDING TAMPER EVIDENCE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for recovering previously activated security profiles utilizes memory and a security application. Initially, the security application enables a user to define a first security profile. After defining the first security profile, the user submits a request for activating the first security profile, and in response, the security application modifies a machine state of the computer system. The modification of the machine state in response to this request locks down the computer system, thereby implementing the first security profile defined by the user. Also in response to the request for activating the first security profile, the security application stores, in the memory, data indicative of the machine state so that the first security profile can be again implemented at a later time, if desired. In this regard, after causing a different security profile to be implemented by the computer system, a user may submit a request for changing the security profile of the computer system back to the first security profile. In response to such a request, the security application retrieves the data previously stored in the memory and automatically modifies the machine state so that the first security profile is again implemented by the computer system. As a result, any changes made to the security profile of the computer system since the submission of the aforementioned request for activating the first security profile are effectively nullified.