COMPUTER SECURITY PRODUCTS USE

Brand Owner (click to sort) Address Description
5TH FLEET 5th FLEET 670 W. Arapaho, Suite 3 Richardson TX 75080 computer security products for use in the field of data security, namely, computer software and computer hardware for generation and authentication of passwords and for secure transmission of data across computer networks; electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of data security and password authentication, provided via computer and communication networks;FIFTH FLEET;
ALPHACIPHER ALPHACIPHER ACQUISITION CORPORATION 401 Second Avenue South, Suite 500 Seattle WA 98104 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY;ALPHA CIPHER;
ALPHACIPHER DESKTOP Vadium Technology, Inc. Suite D 4507 Pacific Highway East Tacoma WA 98424 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY;ALPHACIPHER DESK TOP;DESKTOP;
ALPHACIPHER MOBILE ALPHACIPHER ACQUISITION CORPORATION 401 Second Avenue South, Suite 500 Seattle WA 98104 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY;MOBILE;
CRYPTICORE Cryptico A/S Fruebjergvej 3 2100 Kobenhavn O Denmark Computer security products for use in the field of data security, namely, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, namely, software development tools and products, namely, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, namely, for use in electronic transmission and authentication of information in the field of communications; computer firmware, namely, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone, audio receivers, video receivers and data receivers, namely PCI cards, set top boxes and satellite receivers, PC cards, LAN cards, and WLAN cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, PC cards, set-up boxes and network interface cards; wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, namely smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, namely, network integrity; computer terminals for use with credit cards, debit cards and smart cards, namely, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, namely, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards;Printed matter in the form of pamphlets, brochures, newsletters, journals, magazines, printed computer software program guides all related to computers, computer hardware, computer control units, computer software and computer software algorithm specifications and computer software product specifications; manuals in the fields of encryption, decryption, software certification, computer use authorization, authentication, verification, data privacy, confidentiality and data integrity; printed matter, namely, newsletters, pamphlets, brochures, journals and magazines concerning education and training programs in the field of encryption, decryption, software certification, computer use authorization, authentication, verification, data privacy, confidentiality and data integrity; mounted and unmounted photographs; stationery; printed matter, information and publications in the form of brochures, books, handbooks, and magazines all in the field of encryption, decryption, software certification, computer use authorization, authentication, verification, data privacy, confidentiality and data integrity; debit cards without magnetic encoding; and printed instructional, educational and teaching materials for educational and training programs in the field of encryption, decryption, software certification, computer use authorization, verification, ensuring of data privacy, confidentiality and data integrity;CRYPT I CORE;Computer security analyses services; consultancy in connection with technological licensing of encryption methods, security computer hardware and security computer software; consultancy in connection with security in the field of technology information, namely encryption and security consultancy; consultancy concerning computer security questions;Computer programming for others and computer data programming for others; development of computer systems for others; design of computer systems for others; updating of computer software for others; research in and development of computer software for others; research in and development of computers and computer software for others; technical computer consultancy; rental of computers and computer software; design and updating of computer software and computer hardware for others; design of web sites and computer software for others;
DIGITAL PRIVACY SECURITY & TRUST VADIUM TECHNOLOGY CORPORATION 401 Second Avenue South, Suite 500 Seattle WA 98104 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY;DIGITAL PRIVACY SECURITY AND TRUST;DIGITAL PRIVACY SECURITY;
IAPTUS Vadium Technology, Inc. Suite D 4507 Pacific Highway East Tacoma WA 98424 Computer security products for use in the field of data security, namely, computer hardware and computer software that integrate cryptographic security features into primary software and hardware applications and other software and hardware applications, and computer hardware and computer software that permit access to data, facilities or controlled locations, whether electronic or physical locations, by generating access codes and by verifying access codes; computer hardware and computer software that authenticate users; computer hardware and computer software that issue and manage digital user identities and access privileges for electronic and physical security;
INARMA SECURITY INARMA SECURITY 8233 North Gray Log Lane Fox Point WI 53217 computer security products for use in the field of computer network and systems security, namely, computer software for monitoring computer network and systems security for detecting unauthorized attempts to access computer networks and systems;Risk management and risk management consultation;SECURITY;Computer consultation in the field of computer network and system security; remote monitoring the security of computer networks and systems for others; computer project management services; hosting the web sites of others on a computer server for a global computer network; design of computer network security software for others; design of computer networks and systems for others; litigation support services in the field of computer network and system security; crisis management, namely, planning and implementing responses to computer or network system tampering; due diligence services, namely, evaluation of computer or network system security of companies involved in mergers, acquisitions, investments transactions distribution or licensing agreements;
LOCKFAST Griffin Technologies 916 Massachusetts St Suite 200 Lawrence KS 66044 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY USER AUTHENTICATION EQUIPMENT COMPRISING COMPUTER PERIPHERALS AND SOFTWARE THAT AUTHENTICATE COMPUTER USERS AND THEN PERMITS ACCESS TO DATA;LOCK FAST;
MARATHON ALPHACIPHER ACQUISITION CORPORATION 401 Second Avenue South, Suite 500 Seattle WA 98104 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY;
MOBILESEC Vadium Technology, Inc. Suite D 4507 Pacific Highway East Tacoma WA 98424 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY;MOBILE SECURITY;
MUGI KABUSHIKI KAISHA HITACHI SEISAKUSHO 6-6, Marunouchi 1-chome, Chiyoda-ku Tokyo 100-8280 Japan Computer security products for use in the field of data security, namely, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, namely, software development tools and products, namely, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, namely, for use in electronic transmission and authentication of information in the field of communications; computer firmware, namely, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone, audio receivers, video receivers and data receivers, namely PCI cards, set top boxes and satellite receivers, PC cards, LAN cards, and WLAN cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, PC cards, set-up boxes and network interface cards; wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, namely smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, namely, network integrity; computer terminals for use with credit cards, debit cards and smart cards, namely, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, namely, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards;
MUGI KABUSHIKI KAISHA HITACHI SEISAKUSHO 6-6, Marunouchi 1-chome, Chiyoda-ku Tokyo 100-8280 Japan Computer security products for use in the field of data security, namely, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, namely, software development tools and products, namely, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, namely, for use in electronic transmission and authentication of information in the field of communications; computer firmware, namely, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone, audio receivers, video receivers and data receivers, namely PCI cards, set top boxes and satellite receivers, PC cards, LAN cards, and WLAN cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, PC cards, set-up boxes and network interface cards; wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, namely, smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, namely, network integrity; computer terminals for use with credit cards, debit cards and smart cards, namely, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, namely, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards;
RECOGNOS Vadium Technology, Inc. Suite D 4507 Pacific Highway East Tacoma WA 98424 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELDS OF DATA SECURITY, ACCESS CONTROL, AUTHENTICATION AND IDENTITY MANAGEMENT NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY, ALONG WITH COMPUTER HARDWARE AND SOFTWARE FOR BIOMETRIC IDENTIFICATON, VERIFICATION AND SURVEILLANCE OF INDIVIDUALS FOR THE ISSUANCE AND AUTHENTICATION OF IDENTIFICATION CARDS, DRIVERS' LICENSES, PASSPORTS, VISAS AND OTHER TRAVEL AND ACCESS IDENTITY DOCUMENTS, INSTRUMENTS AND TOKENS, ALL OF WHICH MAY OR MAY NOT INCORPORATE RADIO FREQUENCY IDENTIFICATION SYSTEMS;
RSA SECURITY EMC CORPORATION 176 South Street Hopkinton MA 01748 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC COMMERCE AND SECURITY, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO OTHER SOFTWARE APPLICATIONS;SECURITY;
THE MOST TRUSTED NAME IN E-SECURITY RSA SECURITY INC. 174 MIDDLESEX TURNPIKE BEDFORD MA 01730 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC COMMERCE AND SECURITY, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO OTHER SOFTWARE APPLICATIONS;THE MOST TRUSTED NAME IN E SECURITY;
THE NETWORK SECURITY COMPANY ODS NETWORKS, INC. 1101 E. Arapaho Road Richardson TX 75081 Computer security products for use in the field of data and network security-- computer software for use in detecting unauthorized access or attempts to access, computer systems and networks, and computer software for use in monitoring the safety and data integrity of a computer system or computer network, and instruction manuals sold as a unit therewith;
VADIUM TECHNOLOGY ALPHACIPHER ACQUISITION CORPORATION 401 Second Avenue South, Suite 500 Seattle WA 98104 COMPUTER SECURITY PRODUCTS FOR USE IN THE FIELD OF DATA SECURITY, NAMELY, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO PRIMARY SOFTWARE AND HARDWARE APPLICATIONS AND OTHER SOFTWARE AND HARDWARE APPLICATIONS, AND COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT PERMIT ACCESS TO DATA, FACILITIES OR CONTROLLED LOCATIONS WHETHER ELECTRONIC OR PHYSICAL LOCATIONS BY GENERATING ACCESS CODES AND BY VERIFYING ACCESS CODES, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT AUTHENTICATE USERS, COMPUTER HARDWARE AND COMPUTER SOFTWARE THAT ISSUE AND MANAGE DIGITAL USER IDENTITIES AND ACCESS PRIVILEGES FOR ELECTRONIC AND PHYSICAL SECURITY;TECHNOLOGY;
VADIUM TECHNOLOGY, INC. Vadium Technology, Inc. Suite D 4507 Pacific Highway East Tacoma WA 98424 Computer security products for use in the field of data security, namely, computer hardware and computer software that integrate cryptographic security features into primary software and hardware applications and other software and hardware applications; computer hardware and computer software that permit access to data, facilities or controlled locations whether electronic or physical locations by generating access codes and by verifying access codes; computer hardware and computer software that authenticate users; computer hardware and computer software that issue and manage digital user identities and access privileges for electronic and physical security; application specific integrated circuits used for cryptographic security features that protect and permit access to data, facilities and controlled locations;VADIUM TECHNOLGOY INCORPORATED;TECHNOLOGY, INC.;
WAR ON HACKERS Smith, Steven W. 7237 Birchwood Drive Dallas TX 75240 computer security products for use in the field of data security, namely, computer software and computer hardware for generation and authentication of passwords, for secure transmission of data across computer networks, and for providing user authentication of electronic funds transfers, credit and debit card transactions, and electronic check transactions via a global computer network; computer software and computer hardware for enabling a user to access multiple secure applications through a single sign-on event; computer software and computer hardware for controlling access to wireless and wire line communication networks; and electronic software updates, namely, downloadable computer software and associated data files for updating computer software in the fields of data security and password authentication, provided via computer and communication networks;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.