FOOT FILES

Brand Owner (click to sort) Address Description
BATH ADDICTION Bath Accessories Company, Inc. 3146 TIGER RUN COURT, SUITE 117 CARLSBAD CA 92010 Foot files;[ Bath toys ];[ Bathrobes, slippers, gloves and mitts, socks, hand and foot cozies being mittens and booties, shower caps, and turbans ];Towels;Exfoliating towels, body brushes, nail brushes, bath sponges, bath scrubbers for scrubbing skin, and soap dishes and holders;BATH;Bath pillows; toe separators for personal care;
LIFE CANDY FOREVER NATURAL INC 150 ST. REGIS CRESCENT SOUTH NORTH YORK, ONTARIO M3J 1Y8 Canada Foot files, manicure sets;Pumice stones for foot and hand care; bath soaks, bath and body creams and lotions; bath soaking powders, oils and bath milk; soaps; cosmetics, facial mask and lotions, hand, face and body soaps and cleansing washes and lotions, skin lotions, moisturizers and creams, gloves and socks for moisturizing; aromatherapy products, namely, scented oils, scented body massage oils; scented sachets, potpourri, scented room oils; gift baskets containing personal care items, namely, a combination of any one or more of body scrub products, massage products, personal beauty care products, soaps, cosmetics, toiletries and scented home products;
PLUM BEAUTY Clio Designs Incorporated 1000 Highland Ave. Needham MA 02494 Foot files; razors, electronic or non-electronic;Beauty masks for the face, namely, non-adhesive silicone face wraps;Electronic facial steamers;Facial rollers; electric massage appliances, namely, electric facial massagers;Electric face cleansing brushes;BEAUTY;Handheld personal mirrors;
SOFTEX DIVERSIFIED GLOBAL TECHNOLOGIES 128 Singleton Street Woonsocket RI 02895 Foot files;Foot care ointments not for medical use, non-medicated foot care creams;Shoe inserts for primarily non-orthopedic purposes, shoe insoles;SOFT TECH;Toe separators for applying ointment, cream, or nail polish;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An encrypted file system that uses the encryption of files in a computer to restrict access to the files. Encrypted files are associated with a user. A decryption key is required in order to allow changes to be made to any of those files. Other files, such as those files which are less sensitive, may be unencrypted, and may be accessed even when the user is unavailable. These files may be read only files. A duplicate decryption technique may be allowed to allow access to the files, if the decryption key becomes unavailable. Certificates can verify access to the different files.