SECURITY LOCKS ENGAGING SLOTS

Brand Owner (click to sort) Address Description
CWALL LOCK Noble Security Inc. 13521 Immanuel Road Pflugerville TX 78660 security locks for engaging slots or cavities in portable electronic devices; security slots and cavities formed in portable electronic devices;
WEDGE Noble Security Inc. 13521 Immanuel Road Pflugerville TX 78660 security locks for engaging slots or cavities in portable electronic devices; plates attachable to portable electronic devices containing trapezoidal cavities for use with security locks for engaging slots in portable electronic devices;
WEDGE C Noble Security Inc. 13521 Immanuel Road Pflugerville TX 78660 security locks for engaging slots or cavities in portable electronic devices; security slots and cavities formed in portable electronic devices;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for recovering previously activated security profiles utilizes memory and a security application. Initially, the security application enables a user to define a first security profile. After defining the first security profile, the user submits a request for activating the first security profile, and in response, the security application modifies a machine state of the computer system. The modification of the machine state in response to this request locks down the computer system, thereby implementing the first security profile defined by the user. Also in response to the request for activating the first security profile, the security application stores, in the memory, data indicative of the machine state so that the first security profile can be again implemented at a later time, if desired. In this regard, after causing a different security profile to be implemented by the computer system, a user may submit a request for changing the security profile of the computer system back to the first security profile. In response to such a request, the security application retrieves the data previously stored in the memory and automatically modifies the machine state so that the first security profile is again implemented by the computer system. As a result, any changes made to the security profile of the computer system since the submission of the aforementioned request for activating the first security profile are effectively nullified.