BUSINESS INSTRUCTING PUBLIC

Brand Owner (click to sort) Address Description
CHANGE YOUR LIFE LYNN, JUDITH ANN 344 WEST 72ND ST. NEW YORK NY 10023 BUSINESS OF INSTRUCTING THE PUBLIC IN THE SKILLS ASSOCIATED WITH ROLLE RSKATING AND ROLLERSKATE DANCING, PRODUCING ROLLERSKATING DEMONSTRATIO NS AND SHOWS, ORGANIZING ROLLERSKATES AND ASSOCIATED EQUIPMENT TO THE GENERAL PUBLIC;
GOODSKATES LYNN, JUDITH ANN 344 WEST 72ND ST. NEW YORK NY 10023 BUSINESS OF INSTRUCTING THE PUBLIC IN THE SKILLS ASSOCIATED WITH ROLLE RSKATING AND ROLLERSKATE DANCING, PRODUCING ROLLER SKATING DEMONSTRATI ONSAND SHOWS, ORGANIZING ROLLERSKATE DANCESAND DANCE EXHIBITIONS; AND RENTING ROLLERSKATES AND ASSOCIATED EQUIPMENT TOTHE GENERAL PUBLI C;APPLICANT DISCLAIMS ANY EXCLUSIVE RIGHT TO THE WORD SKATES APART FROM THE MARK AS SHOWN.;
THE GOODSKATES Lynn; Judith Ann 344 W. 72nd St. New York NY 10023 Business of Instructing the Public in the Skills Associated with Rollerskating and Rollerskate Dancing, Producing Rollerskating Demonstrations and Shows, Organizing Rollerskate Dances and Dance Exhibitions; and Renting Rollerskate and Associated Equipment to the General Public;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for providing secure access to information held in a shared repository, for example to electronic business cards stored on a server. A data owner registers with the server and provides information to be shared with selected data users. The server returns public-key cryptography keys. To access the information, a data user sends its public key to the data owner. The data owner encrypts the public key using the data owner private key, and sends the result to the server, along with permission to transfer information to the data user. The server decrypts the received result using the data owner public key, and compares the outcome with the data user public key. If they match, the server records permission on an access list. In response to a request for information the server checks the access list to determine whether the data user has permission. If so, the server encrypts the information using the data user public key, and transfers the result to the data user.