ROOT

Brand Owner (click to sort) Address Description
FOUR ROOT FOUR ROOT 3044 35th Street, Apt. 2F Astoria NY 11103 4 ROOT; FOR ROOT;Restaurant and bar services; Restaurant, bar and catering services;
R00T Michael Park 555 Soquel Ave. Santa Cruz CA 95062 ROOT; R ZERO ZERO T;Business management consultancy and advisory services;
ROOT FORCE Berg-Warner Nursery, Inc. 3216 West 850 North Lizton IN 46149 ROOT;Natural agricultural products, namely, live trees, bushes and plants produced by using a proprietary root pruning process;
ROOT GOLD Shammas, Milo P.O. Box 3518 Ventura CA 930063518 ROOT;Cat food; Cattle feed; Dog food; Fruit, fresh; Horse feed; Livestock feed; Vegetables, fresh; Fresh herbs;
ROOT RIOT HYDRODYNAMICS INTERNATIONAL, INC. 5711 Enterprise Drive Lansing MI 48911 ROOT;Container for starting and growing plants in the form of a cube of naturally composted fine milled sphagnum peat moss;
ROOTS 1-2-3 ROOTSinc. 3120 Weatherford Road Independence MO 64055 ROOT 123;Fertilizers and soil amendments for agricultural and domestic use;
YOUR ROOT TO SUCCESS BALL HORTICULTURAL COMPANY 622 Town Road West Chicago IL 60185 ROOT;Live plants, namely perennials and bulbs;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Systems and methods are described for distributing and updating trusted certification authorities to computer systems and users. When a digital certificate is encountered during a secured electronic transaction, the root authority of the certificate is determined. It is then determined whether the root authority is a trusted authority by attempting to locate the root authority in a trusted root list. If the root authority is not included in the trusted root list, a remote site is accessed and an updated version of the trusted root list is downloaded. The new trusted root list is checked for the presence of the encountered certificate and, if found, the transaction is allowed to proceed. In one implementation, the entire trusted root list is not downloaded. Instead, if an appropriate digital certificate is located, then the certificate is downloaded and added to the trusted root list of the computer system. The transaction may then proceed.