Trillium Incorporated

 Trillium Incorporated contact information is shown below
Owner:TRILLIUM INCORPORATED
Owner Address:Moriyama-ku, Omori, Hachiryu 1-208 Nagoya 4630028 Japan
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byTrillium Incorporated

Brand:

BRAINBOX

Description:

Computer hardware and software sold as a unit for testing of embedded computer software systems; Cybersecurity software for encryption, authentication, key management, firewall, secure over-the-air updates; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;BRAIN BOX;

Category: COMPUTER HARDWARE SOFTWARE SOLD
Brand:

CRAWL2HOME

Description:

Computer software and hardware for providing internet of things (IoT) and automotive security solutions against hacking, intrusion, disruption of critical communication and other cybersecurity threats; computer software and hardware for protecting connected cars and internet of things (IoT) connected devices from malicious cyber attacks;CRAWL TO HOME;

Category: COMPUTER SOFTWARE HARDWARE
Brand:

CRAWL2STOP

Description:

Computer software and hardware for providing internet of things (IoT) and automotive security solutions against hacking, intrusion, disruption of critical communication and other cybersecurity threats; computer software and hardware for protecting connected cars and internet of things (IoT) connected devices from malicious cyber attacks;CRAWL TO STOP;

Category: COMPUTER SOFTWARE HARDWARE
Brand:

DKLP

Description:

Automated process control software used to monitor the status of industrial processes, namely, power generation, electrical distribution and oil and gas processing; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for providing Internet of things (IoT) and automotive security solutions against hacking, intrusion, disruption of critical communication and other cybersecurity threats;

Category: AUTOMATED PROCESS CONTROL SOFTWARE USED
Brand:

DYNAMIC KEY-LOCK PAIRING

Description:

Automated process control system, namely, micro-processor based hardware and software used to monitor the status of industrial processes, namely, power generation, electrical distribution and oil and gas processing; computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files;DYNAMIC;

Category: AUTOMATED PROCESS CONTROL SYSTEM
Brand:

HEAVENZ

Description:

Software application platform for securely connecting people, services and devices to the internet; computer software for database and application modeling; computer programs for use in developing computer software in an object-oriented programming language; computer software development tools for creating applications for connecting people, services and devices to the internet; computer software for use in connection with creating an integrated development environment (IDE) for building applications for securely connecting people, services and devices to the internet; computer software that enables searching and analysis of connected devices, business system records, and equipment data;HEAVEN Z; HEAVENS;

Category: SOFTWARE APPLICATION PLATFORM SECURELY
Brand:

PSY4Z

Description:

Computer software for encryption, authentication, key management; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;PSY FOUR Z; PSY FOR Z;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

PSY4Z

Description:

PSY FOUR Z;Providing temporary use of non-downloadable software for encryption to be used for authentication, key management; Providing temporary use of non-downloadable cloud-based software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Providing temporary use of non-downloadable software for providing real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; providing temporary use of non-downloadable software for protecting connected cars and Internet of things (IoT) connected devices from malicious cyber-attacks;

Category: PSY FOUR Z
Brand:

SECUREBOOT

Description:

Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;SECURE BOOT;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

SECURECAR

Description:

Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;SECURE CAR;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

SECUREETHER

Description:

Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;SECURE ETHER;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

SECUREIOT

Description:

Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;SECURE I OT; SECURE INTERNET OT;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

SECUREIXS

Description:

Computer software for creating a firewall. Smart firewall technology to prevent unauthorized messages from entering the system;

Category: COMPUTER SOFTWARE CREATING
Brand:

SECUREIXS

Description:

Providing temporary use of non-downloadable cloud-based software for creating a firewall to prevent unauthorized messages from entering the Internet of things (IoT) including car systems, detect unauthorized messages that entered the Internet of things (IoT) including car systems, identify their source, counter attack and neutralize the unauthorized messages; providing temporary use of non-downloadable cloud-based software for protecting connected cars and Internet of things (IoT) connected devices from malicious cyber attacks;

Category: PROVIDING TEMPORARY USE NON DOWNLOADABLE
Brand:

SECURELIN

Description:

Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface;SECURE LIN;

Category: COMPUTER SOFTWARE ENCRYPTION
Brand:

SECUREOTA

Description:

Computer software, namely, an application allowing wireless over-the-air updates to remote devices in real time; Electronic software updates, namely, downloadable software, libraries and associated data files for updating computer software in the fields of cybersecurity, provided via computer and communication networks;SECURE OTA; SECURE OVER THE AIR;

Category: COMPUTER SOFTWARE
Brand:

SECUREOTA

Description:

SECURE OVER THE AIR;Providing temporary use of non-downloadable cloud-based software for allowing wireless over-the-air updates to remote devices in real time; providing electronic software updates, namely, providing software, libraries and associated data files for updating computer software in the field of cybersecurity; providing temporary use of non-downloadable cloud-based software for protecting connected cars and Internet of things (IoT) connected devices from malicious cyber-attacks;

Category: SECURE OVER AIR
Brand:

SECURESKYE

Description:

SECURE SKYE;Platform as a service (PAAS) featuring computer software platform for providing security solutions against hacking, intrusion, disruption of critical communication and other cybersecurity threats; platform as a service (PAAS) featuring computer software platform in the automotive security field for protecting connected cars and Internet of things (IoT) connected devices from malicious cyber attacks; cloud-based large volume of data analytics computer software platform for collecting data from vehicles' sensors to enable creation of a comprehensive, dynamically updated profile of the vehicle's state to be utilized by vehicles' users, makers and insurers to facilitate and improve vehicle maintenance and safety;

Category: SECURE SKYE
Brand:

SENTINEL

Description:

Computer software, namely, neural network software for providing internet of things (IoT) and mobile cyber security solutions; Artificial intelligence and artificial intelligence systems computer software in the nature of neural network software for security and operational monitoring of cars, vehicles, aircraft, watercraft, infrastructure systems, construction and heavy equipment, network infrastructure devices and internet of things (IoT) devices;

Category: COMPUTER SOFTWARE
Brand:

TRILLIUM

Description:

The mark consists of the word TRILLIUM in a stylized font. The letters TRI and IUM are depicted in the color black, the letters LL are depicted in the color red. The top of the first letter L and the bottom of the second letter L taper towards their ends. The background is white.;The color(s) black, white and red is/are claimed as a feature of the mark.;Providing technical and customer-support services in the automotive security field, namely, providing data encryption services and technical support, namely, troubleshooting in the nature of diagnosing problems with issuance and management of digital certificates, digital signature authentication and encryption; developing, designing, implementing, testing, analyzing, and consulting services for computer software in the field of automotive security; developing, integrating and operating computer electronic data security systems to support automotive security; technical support, namely, monitoring computer and data transmission network systems in the field of automotive security; offering technical advice related to troubleshooting and repair of software in the field of automotive security and computer software consultation in the field of automotive security; automotive security analysis services, penetration testing and cybersecurity analysis, namely, providing information to improve software system security;

Category: