PERSONAL SECURITY SYSTEM COMPRISING

Brand Owner Address Description
EKOCARE MULTITONE ELECTRONICS PLC Multitone House, Shortwood Copse Lane Kempshott, Basingstoke Hampshire RG237NL United Kingdom Personal security system comprising of software and hardware for providing alarm status by transmitting and receiving signals from both fixed and mobile devices and other information to a remote station; personal security alarms; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; personal pagers; network pagers; integrated pagers; computer hardware, namely, wireless network base stations, hubs, routers, transmitters, receivers, and repeaters; computer software for application and database integration; interfaces for computers; central hubs for computer networks; two-way radios; emergency position-indicating radio beacons; telecommunications and data wireless networking hardware; telecommunications and data wireless networking software for providing a self-forming and self-healing wireless network; telecommunication base stations; electronic devices for locating people using an alarm device which sends location information via a beacon; electronic devices for locating and tracking people, equipment, and assets using wireless networks, mesh networks, cellular communication networks, or global positioning systems; telemetry devices using mesh radio networks; electronic apparatus and equipment for monitoring plants, factories, offices, hospitals and other institutions; wireless transmitters for use in emergency communication;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A secure operating system is disclosed in which all code implementing security functionality resides in a security module separate from the operating system code. Calls involving security functions are made using a format or interface which is standardized for all systems. Such a call identifies, inter alia the response and the access mode which are used to identify a call in a two dimensional table which contains a pointer to the needed security functions. In the way security functions are separately compilable and security solving changes can be made by linking in a new security module. Maintenance of security code is separated from maintenance of the underlying operating system.