CUTTING KEYS

Brand Owner Address Description
ALLIED FIRE & SECURITY TOTAL INTEGRATED PROTECTION Allied Safe & Vault Co., Inc. 425 W. Second Avenue Spokane WA 99204 Cutting keys; fabrication of key systems, namely, custom fabrication of keys and locks for others;The mark includes a word mark needing no description. The design portion of the mark is of a truncated triangle having bars and is suggestive of the letter A.;Electronic monitoring systems comprised of cameras, and detectors for use in monitoring fire, burglary, temperature, sprinklers, telephones, hold-up detectors and alarms, and panic detectors and alarms;Metal safes;Installation and repair services for the following-- locks, multi-location lock systems, keys, key systems, access control systems, video surveillance systems, intruder detection systems, fire detection systems, identification badge reading and detection systems, safes, vaults, depositories, deal drawers, remote transaction systems, namely, pneumatic tube conveying systems for money and documents; re-keying of locks;ALLIED FIRE AND SECURITY TOTAL INTEGRATED PROTECTION;Color is not claimed as a feature of the mark.;Retail store services and on-line retail store services featuring safes, vaults, night depositories, security filing cabinets, locks, multi-location lock systems, keys, key systems, access control systems, video surveillance systems, intruder detection systems, fire detection systems, identification badge reading and detection systems, remote transaction systems, namely pneumatic tube conveying systems for money and documents;FIRE & SECURITY and INTEGRATED PROTECTION;Custom design of key systems for others;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Keys (e.g., decryption key, authentication key) are stored in a non-volatile memory of a display unit. The keys are retrieved in encrypted form into an integrated circuit. The integrated circuit decrypts the keys and uses the keys. As the keys are available in decrypted form only within the integrated circuit and potentially only during use, the keys may not be available to unauthorized third parties.