Serial Number:
76342456
Mark:
TOMORROW'S TECHNOLOGIES TODAY
Status:
Abandoned-Failure to Respond
Status Date:
12-11-2002
Filing Date:
Registration Number:
N/A
Registration Date:
N/A
Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security, hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory operating system, onboard modifiable software store and secure access for computer systems management Hardware based computer technology for business management and administration; programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce business to business transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management Hardware based computer technology programmed design and permit the secured transmittal of messages from user to user and the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (e.g. files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a software store and secure access for computer systems management Hardware based computer technology which provides education and training for users of computer and electronic systems to permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e-commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to eternal port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management Hardware based computer technology programmed to design and permit the safe storage of data and software within a computer (without the need to use firewalls and data encryption software) and prevents unauthorized reads and writes to the hard disk drive; hard ware based, computer technology to permit the safe transmission of data and data processing procedures (eg files, messages and e- commerce transactions) via electronic media and unique recognizable keys for computer security; hardware technology to deny access to computer systems by hackers, prevent viruses to affect computer systems; computer device which attaches to external port of computer and programs as a self contained intelligent device with its own memory, operating system, onboard modifiable software store and secure access for computer systems management
Mark Description:
N/A
Class:
Scientific and technological services
Type of Mark:
Trademark
Published for Opposition Date:
N/A
Owner:
Mark Drawing Status:
Typed Drawing
Abandon Date:
10-03-2002
Business Name:
LINER YANKELEVITZ SUNSHINE & REGENSTREIF
Correspondent Name: