ACCESS CONTROL SECURITY SYSTEMS COMPRISING

Brand Owner (click to sort) Address Description
ALPHATOUCH Goldcom Inc. 42 CENTRAL DRIVE FARMINGDALE NY 11735 access control security systems comprising computer hardware and software for use in controlling access to facilities and areas by control of gates, doors and windows; computer keypads; electronic visitor management software which records entry and exit of visitors, employees and packages, records who picks up packages, identifies who is allowed access to a building; Telephone apparatus, namely, intercoms; Video-Intercom; Security products, namely, entry door systems comprising touch pads and security doors; electric and magnetic door contacts, proximity readers and access control keypads and devices in the nature of electronic readers and controllers for controlling access to a premises, electric door release in the nature of digital door locks, electronically-operated door latches, and magnetic door locks, electrical relays and controllers, touchscreen and regular screen personal computers and liquid crystal display (LCD) display monitors and, voice display monitors, computer display monitors, Internet and wireless local area networks access points for network computer users, Smartphone and smart device software applications for mobile phones, and handheld computers, namely, software for operating security and control access systems, Bar code scanners and signature pads, namely, touch pads, electronic door ajar alarm, Intercom, communication and security equipment, namely, control panels, software for operating access control and alarm monitoring systems, computer peripheral devices, passive infrared detectors, magnetic door contacts, digital voice recorders and audio speakers, remote arming and disarming controls, and telephone digital dialers, namely, automatic telephone dialers, all for residential, industrial, and commercial use; Building security systems comprising software and hardware for providing picture, video, alarm status, building plans, and other information to a remote station;ALPHA TOUCH;
CLOTURES BEL-AIR FENCE Master-Halco Corp. 1959 Upper Water Street Suite 800 Halifax CA 92868 Access control security systems comprising computer hardware, computer software for use in monitoring and controlling access to facilities, burglar and theft sensors, alarms, and video monitors; remote video monitoring systems comprising video cameras, sensors burglar alarms, theft alarms, video monitors and controls therefore; closed circuit television, intrusion detection and burglar alarms; infrared motion detectors; proximity detectors; vibration detectors; perimeter protections systems comprising video monitors, burglar and theft alarms, controls, electronic security gates, security fences, electronic retractable vehicle barriers, building access controls, and outdoor lighting; and human identification scanners, sensors, and readers for use with fingerprint matching, photo identification, retinal scanning, and biometric identification; automatic security turnstiles;Non-metallic fencing systems comprised of fence panels, fence rails, fence gates, fence posts, fence stays, gate hardware, latches and hinges, composed of wood, polymer and vinyl materials; commercial guard rails made of wood; non-metal corral gates, non-metal corral fittings, namely, post caps, picket tops, rail brackets, and rail clips; non-automatic non-metal turnstiles;Metal chain link fencing, metal ornamental fencing, aluminum fence lattice; metal fence fittings and hardware for metal, ornamental, chain link and wood fencing, namely, tension bands, brace bands, post caps, barb arms, rail ends, and truss rods; metal fence posts; residential, industrial and commercial, metal gates; residential, industrial and commercial metal gate fittings and metal gate hardware, namely, gate frame hinges, post hinges, closers, hanger bolts, bulldog hinges, box hinges, 180º hinges, offset 180º hinges fork latch assemblies, forks, and latches; metal corral gates, metal corral fittings, namely, end, line and corner rail clamps, sleeves, plugs, closers, pig tail hooks, weld- on and wall mount gate brackets; non-automatic metal security turnstiles; commercial guard rails made of metal; metal rail fittings in the nature of railing racks, end, line, and corner rail clamps, sleeves, plugs, saddle and panel clamps to build railings, racks, and awning frames; metal accessories for fencing, namely, nuts, bolts, washers, rivets, screws, turnbuckles, fence stays, chains, post clips, floor flanges, bolt fasteners, anchors, hog rings, aluminum ties, steel ties, barb wires, tension wire, barbless wire, wire rope clips, wire rope, wire rope thimbles, u-bolts, and nails; and galvanized metal tubing and pipe;Installation and maintenance of perimeter security systems and access control systems;Security guard services, namely, outdoor perimeter security system response; perimeter security system verification and monitoring services;The English translation of the word CLOTURES in the mark is FENCE.;CLOTURES AND FENCE;residential and commercial kennels made of metal and chain link for dogs and other animals;
INOVA CSG SECURITY, INC. 5201 EXPLORER DRIVE MISSISSAUGA, ONTARIO L4W 4H1 Canada access control security systems comprising integrated card readers and computer hardware and software in the nature of programming cards and programmable door releases;
ISTAR SENSORMATIC ELECTRONICS CORPORATION 6600 Congress Avenue Boca Raton FL 33487 ACCESS CONTROL SECURITY SYSTEMS COMPRISING COMPUTER HARDWARE AND SOFTWARE FOR USE IN CONTROLLING ACCESS TO FACILITIES AND AREAS AND FOR USE IN MONITORING EVENTS;
KEEP BY FEENICS Feenics Inc. #301 2310 St. Laurent Blvd Ottawa, Ontario K1G5H9 Canada Access control security systems comprising computer software for use in controlling access to facilities and areas by control of gates, doors and windows, intrusion points motion detectors, glass break detectors, door contacts; computer software for use in video surveillance or close circuit television systems, namely, cameras and sensors which capture, receive, store, manage, and/or distribute data for the purpose of analysis, reporting and retrieval; computer software for use in sending alarm notification to on-site and remote management facilities; computer software for the control of alarms and security, fire, and gas detection systems; computer management software for use in security and surveillance systems; computer software, for management, automation and monitoring of electronic sensors of physical activity, physical premises security systems, video cameras, environmental sensors, HVAC systems; electronic visitor management software which creates identification badges, records entry and exit of visitors, employees and packages, specifies whether visitors require escort, records who picks up packages, identifies who is allowed access to a building; computer management systems, namely, computer hardware and software for time and attendance, reporting and integration;KEEP BY PHOENIX;
LENEL UTC FIRE & SECURITY AMERICAS CORPORATION, INC. 13995 Pasteur Blvd., Palm Beach Gardens FL 33418 access control security systems comprising computer hardware and software for use in controlling access to facilities and areas by control of gates, doors and the like;
LENEL UTC FIRE & SECURITY AMERICAS CORPORATION, INC. 13995 Pasteur Blvd., Palm Beach Gardens FL 33418 Access control security systems comprising computer hardware and recorded software for use in controlling access to facilities and areas by control of gates, doors and the like;
PASSPOINT Pittway Corporation Northbrook IL access control security systems comprising computer hardware and software for use in controlling access to facilities and areas by control of gates, doors, windows and the like, and management of alarm signals;PASS POINT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An access control system and access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.