SECURITY SOFTWARE PROTECTION

Brand Owner (click to sort) Address Description
ECHOWORX Echoworx Corporation 708-4101 Yonge Street Toronto, ON M2N1P6 Canada Security software for protection and security of data, computer networks and applications; encryption software; Public Key Infrastructure (PKI) software, including software for encrypting/decrypting data, verifying message integrity, and authenticating senders/recipients of electronic messages; computer software for sending and receiving electronic messages, including email, data forms and web mail with encryption, non-repudiation and authentication via the Internet; server software for supporting, sending and receiving electronic messages, including email, data forms and web mail with encryption, non-repudiation and authentication via the Internet; server software for administering the provisioning of a plurality of users with secure delivery of electronic messages including email, data forms, and web mail, via the Internet; computer software for supporting, sending and receiving electronic messages, including e-mail, data forms and web mail with encryption, non-repudiation, and authentication;ECHO WORKS;Consulting services in the field of design and deployment of data security and maintenance of non-repudiation and authentication of computer solutions; and software development and deployment of data security, non-repudiation and authentication solutions;
ECHOWORX SECURE FOLDER Echoworx Corporation 708-4101 Yonge Street Toronto, ON M2N1P6 Canada Security software for protection and security of data, computer networks and applications; encryption software; software for protection and security of computer files, data and applications; Public Key Infrastructure software, namely, software for encrypting /decrypting data; software for supporting encryption of files; software for encrypting/decrypting other computer software, including computer files, data, and applications; security software, namely, encryption software executing on a client computer in a computer network; server software for administering the provisioning of a plurality of users with encryption of computer files, data and applications;ECHO WORKS SECURE FOLDER;Licensing of computer software;SECURE FOLDER;Licensing of intellectual property; computer software development; software development; deployment of data security; software development of security software and encryption software;
SEAL YOUR FILES Echoworx Corporation 708-4101 Yonge Street Toronto, ON M2N1P6 Canada Security software for protection and security of data, computer networks and applications; encryption software; software for protection and security of computer files, data and applications; Public Key Infrastructure software, namely, software for encrypting /decrypting data; software for supporting encryption of files; software for encrypting/decrypting other computer software, including computer files, data, and applications; security software, namely, encryption software executing on a client computer in a computer network; server software for administering the provisioning of a plurality of users with encryption of computer files, data and applications;Licensing of computer software;licensing of intellectual property; computer software development; software development; deployment of data security; software development of security software and encryption software;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. When software is initially loaded to RAM 20, an engine 30A is installed at the beginning of an otherwise empty area of RAM 20. When the protected application is called, the engine first creates a series of steps (FIG. 3D), including a CALL command to a protection block 38. On reaching the call 36, the protection block 38 is executed, to complete various security checks. If these are successful, step 2 is created and written over the call 36 so that execution of steps 2 and 3 can continue as normal. Consequently, the protected software (steps 1, 2 and 3) is not exposed to scrutiny unless the security checks have successfully been completed.