CONTINGENCY READINESS INFRASTRUCTURE SECURITY

Brand Owner Address Description
C.R.I.S.I.S. Trinity Technology Group, Inc. 11781 Lee Jackson Memorial Hwy, Ste 200 Fairfax VA 22033 CONTINGENCY READINESS AND INFRASTRUCTURE SECURITY INFORMATION SYSTEM;Consulting services in the field of national security;Research in the field of intelligence and security; computer consultation in the filed of computer security; consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; computer consulting services in the field of planning, designing, and analyzing business information processes and reengineering software and hardware systems for others; computer information systems analysis and design of computer systems and software for others; design for others of web sites and software applications therefore on local and internal computer networks and the internet; providing design, development and hosting services for others' internet web sites on a global computer network; maintenance of software, software systems and internet web sites for third parties; information technology consultation services; computer consultation on the computer-related aspects of information technology security; computer consultation in the field of computer security; providing information over local and internal computer networks and the internet on the subjects of computer systems analysis, computer systems design services, and software and software development; and providing information via the internet on the subjects of software design;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A security system for preventing unauthorized use of a computer device. An extractable security piece includes an extractable main private key and a main PC public key. A PC security area which is a non-extractable part of the computer device includes a PC private key and an extractable main public key, which, together with the keys of the extractable security piece, constitute a Public Key Infrastructure. The extractable security piece and the PC security area include processing means for mutual authentication of the extractable security piece and the PC security area after the extractable security piece, which had been previously removed, has been reinserted in the computer device, thereby enabling the authorized user to access data stored in the computer device.