DATA ENCRYPTION PROTECTION

Brand Owner (click to sort) Address Description
COMPTIA SECURITY TRUSTMARK THE COMPUTING TECHNOLOGY INDUSTRY ASSOCIATION, INC. 3500 Lacey Road, Suite 100 Downers Grove IL 60515 data encryption and protection, computer hardware and software security, vulnerability assessment, intrusion detections, virus, malware, and spyware software, information technology security, background checks, access and incident management;COMPUTING TECHNOLOGY INDUSTRY ASSOCIATION SECURITY TRUST MARK;The certification mark, as used by authorized persons, certifies the mark, as used by persons and business authorized by the certifier, certifies that persons employed and performing the services have demonstrated a prescribed level of competency by passing an examination test developed by the certifier and administered by an independent testing company on behalf of the certifier.;
COMPTIA SECURITY TRUSTMARK THE COMPUTING TECHNOLOGY INDUSTRY ASSOCIATION, INC. 3500 Lacey Road, Suite 100 Downers Grove IL 60515 data encryption and protection, computer hardware and software security, vulnerability assessment, intrusion detections, virus, malware, and spyware software, information technology security, background checks, access and incident management;The mark consists of the letters CompTIA in bold letters with the words Security Trustmark in title case letters underneath. Instead of the letter a in the word Trustmark there is an image of a security lock with four solid and three blank alternating stripes with an arched handle on top.;COMPUTING TECHNOLOGY INDUSTRY ASSOCIATION SECURITY TRUST M RK;Color is not claimed as a feature of the mark.;The certification mark, as used by authorized persons, certifies the mark, as used by persons and business authorized by the certifier, certifies that persons employed and performing the services have demonstrated a prescribed level of competency by passing an examination test developed by the certifier and administered by an independent testing company on behalf of the certifier.;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and apparatus for storing and retrieving program material for subsequent replay is disclosed. The apparatus comprises a conditional access module, for accepting encrypted access control information and the program material encrypted according to a first encryption key, the encrypted access control information including a first encryption key and temporally-variant control data; the conditional access module having a first decryptor module, for decrypting the encrypted access control information to produce the temporally variant control data; a conversion module for modifying the temporally-variant control data to produce temporally-invariant control data; a re-encryptor module, for re-encrypting the decrypted access control information; a second decryptor module for decrypting the re-encrypted access control information to produce the first encryption key; a copy protection encryption module, communicatively coupleable to the conditional access module and a media storage device, the copy protection encryption module for further encrypting the encrypted program material according to a second encryption key and for encrypting the second encryption key according to a third encryption key to produce a fourth encryption key; and a copy protection decryption module, communicatively coupleable to the conditional access module and the media storage device, the copy protection decryption module for decrypting the encrypted fourth encryption key to produce the second encryption key using the third encryption key.