PROVIDING INFORMATION DOG OWNERS

Brand Owner (click to sort) Address Description
DOGLY Wide World Dog 50 High Ridge Avenue Ridgefield CT 06877 providing information to dog owners in the fields of dog training, dog nutrition and dog health care by certified experts in the respective fields;. telecommunication and tele-video consulting services in the fields of dog training, dog nutrition and dog health care; educational services, namely, providing non-downloadable webinars in the fields of dog training, dog nutrition and dog health care; .personal and virtual training provided by certified experts on dog training, dog nutrition and dog wellness training; providing health care and veterinary services by health care professionals; providing veterinary referrals via the Internet and providing relevant documents via download from the Internet;computer software downloadable from the Internet for accessing documents; downloadaable electronic publications in the field of dog nutrition, wellness and training; providing downloadable webinars in the fields of dog nutrition, wellness and training;telecommunications services, namely, video chats, for chat rooms and social community portals;advertising the services of certified experts in the field of dog nutrition, wellness and training; content management for documents and presentations by certified experts in the field of dog nutrition, wellness and training; planning and conducting of trade fairs, exhibitions and presentations for economic or advertising purposes; preparation and conduct of public opinion surveys in the field of dog nutrition, wellness and training; online retail store services featuring the sale of items for dogs, namely, collars, harnesses, leashes, toys, food, treats, food supplements, vitamins, bath products, grooming products, essential oils, deodorizers, disinfectants and absorbent pads;
DOGLY Wide World Dog 50 High Ridge Avenue Ridgefield CT 06877 providing information to dog owners in the fields of dog training, dog nutriion and dog health care by certified experts in the respective fields; consulting services in the field of pet training provided by telecommunication and tele-video consulting services, namely, consulting services in the fields of dog training, dog nutrition and dog health care; educational services, namely, personal and virtual on-line training provided by certified experts on dog training, dog nutrition and dog wellness training;DOGGY;advertising services, namely, advertising the services of certified experts in the field of dog nutrition, wellness and training;advertising services of others, namely, providing content management and development of the advertising content of documents and presentations by certified experts in the field of dog nutrition, wellness and training; planning and conducting of trade fairs, exhibitions and presentations for economic or advertising purposes; preparation and conduct of public opinion surveys in the field of dog nutrition, wellness and training; online retail store services featuring items for dogs, namely, collars, harnesses, leashes, toys, food, treats, food supplements, vitamins bath products, grooming products, essential oils, deodorizers, disinfectants and absorbent pads;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An n person secret sharing solution computes n unique keys to be distributed to the secret owners along with an exponentiated version of the secret. The custodian performs an exponent/modulo operation each time one of the keys is received from one of the secret owners. Alternatively, n+1 keys are created by the custodian, and the custodian retains one key after distributing the remaining n keys to the secret owners. After the custodian has received and processed the n keys from the secret owners, he performs an exponent/modulo operation using his own retained key. According to another aspect, a k out of n secret sharing solution involves computing and storing a database having an entry for each unique combination of k keys that could be returned from among the n keys. After k keys have been received, the custodian looks up in the database the entry corresponding to the particular unique combination of secret owners who returned keys. The custodian performs another exponent/modulo operation using the entry retrieved from the database in order to reconstruct the original secret. According to an embodiment, the custodian computes n+1 keys, distributes n of the keys to the secret owners, and keeps one of the keys for himself. The custodian retrieves his own key and performs a final exponent/modulo operation in order to reconstruct the original secret. According to another aspect, a k out of n secret sharing solution involves encrypting the original secret before applying any conventional k out of n secret sharing solution.