SECURITY MANAGEMENT COMPUTER SOFTWARE

Brand Owner Address Description
B.A.S.I.S. STANLEY SECURITY SOLUTIONS, INC. 6161 East 75th Street Indianapolis IN 46250 SECURITY MANAGEMENT COMPUTER SOFTWARE, NAMELY, COMPUTER SOFTWARE FOR USE IN PROVIDING A SEAMLESS INTEGRATION OF ACCESS CONTROL TO BUILDINGS; COMPUTER SOFTWARE FOR USE IN IDENTIFICATION CARD MANAGEMENT; COMPUTER SOFTWARE FOR USE IN MONITORING CLOSE CIRCUIT TELEVISION; AND COMPUTER SOFTWARE FOR USE IN MONITORING BUILDING ALARMS;BASIS;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for controlling integrity measurement of an un-trusted system component on a client system includes a trusted management utility configured to measure the integrity of the un-trusted system component, a trusted fixed token resident on the client system, and a trusted registration service. The trusted registration service creates a signed hash of the trusted management utility software and stores the signed hash of the trusted management utility software in the trusted fixed token. The trusted registration service creates a security domain and stores the security domain in the trusted fixed token. The trusted fixed token creates a signed hash of the trusted management utility software and the security domain, and securely communicates the signed hash of the trusted management utility software and the security domain to the trusted registration service. The trusted management utility software is installed on the client system and executed to gather integrity measurements on the un-trusted system component. A hash of the un-trusted system component and the trusted management utility software is created and stored in the trusted fixed token. This data may be combined with the security domain. The hash of the un-trusted system component, the trusted management utility software, and the security domain may be interrogated by the trusted registration service to verify the integrity of the un-trusted system component.