OWNERS CHOICE

Brand Owner (click to sort) Address Description
HOMEOWNER'S CHOICE Harbor Sales Company 1202 E. Maple Troy MI 48083 HOME OWNERS CHOICE;Color is not claimed as a feature of the mark.;All-Purpose Tarps and Covers;
OWNER'S CHOICE WILLIAM GRANT & SONS, INC. 130 Fieldcrest Avenue Edison NJ 08837 OWNERS CHOICE;GIN, VODKA, SCOTCH AND BLENDED WHISKEY;
OWNER'S CHOICE Washington Mutual Savings Bank 1001 Second Ave. Seattle WA 98101 OWNERS CHOICE;banking services; namely, home loans and lines of credit;OWNER'S;
OWNER'S CHOICE KEVIN C. WOOD P.O. Box 667 Shoreham NY 11786 OWNERS CHOICE;Promoting the goods of others by preparing and placing photograph advertisements regarding real estate in the print media and in electronic publications accessed through a local area and global computer network;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An n person secret sharing solution computes n unique keys to be distributed to the secret owners along with an exponentiated version of the secret. The custodian performs an exponent/modulo operation each time one of the keys is received from one of the secret owners. Alternatively, n+1 keys are created by the custodian, and the custodian retains one key after distributing the remaining n keys to the secret owners. After the custodian has received and processed the n keys from the secret owners, he performs an exponent/modulo operation using his own retained key. According to another aspect, a k out of n secret sharing solution involves computing and storing a database having an entry for each unique combination of k keys that could be returned from among the n keys. After k keys have been received, the custodian looks up in the database the entry corresponding to the particular unique combination of secret owners who returned keys. The custodian performs another exponent/modulo operation using the entry retrieved from the database in order to reconstruct the original secret. According to an embodiment, the custodian computes n+1 keys, distributes n of the keys to the secret owners, and keeps one of the keys for himself. The custodian retrieves his own key and performs a final exponent/modulo operation in order to reconstruct the original secret. According to another aspect, a k out of n secret sharing solution involves encrypting the original secret before applying any conventional k out of n secret sharing solution.