COMMUNICATION SERVICES USING COMPUTER

Brand Owner Address Description
SECURITY MADE FOR PEOPLE Verimatrix, Inc. 6059 Cornerstone Court West San Diego CA 92121 communication services using computer, telecommunication and data transmission networks, namely, communications by computer terminals; services for supplying telecommunication networks, namely, providing third party users with access to telecommunication infrastructure; data traceability services, namely, co-location services for voice, video and data communications applications; providing information regarding electronic data transmission and telecommunication; consulting services in the field of electronic data transmission and telecommunication; and rental of telecommunications equipment in the nature of message and data transmission apparatus;software as a service (SaaS) services featuring software for encryption and decryption of computer data; software as a service (SaaS) services featuring software for encrypting and embedding electronic digital signatures to create and authenticate electronic digital certificates; software as a service (SaaS) services featuring software for encoding, decoding, packaging and encrypting digital video, audio and audiovisual content; software as a service (SaaS) services featuring software for automating a process for authentication and identification of digital audio and video media for security purposes; software as a service (SaaS) services featuring software for monitoring, managing, securing and controlling encryption and distribution of digital video, audio and audiovisual content; software as a service (SaaS) services featuring software for providing content management, authentication, identification, management, and analytics in the field of delivery of audio and video via download, streaming, on demand delivery, cable, broadcast, and satellite; software as a service (SaaS) services featuring software for controlling, deploying, monitoring, maintaining and managing watermarking processing, content encryption keys, content distribution rules, and content playback policies in the field of delivery of audio and video via download, streaming, on demand delivery, cable, broadcast, and satellite; software as a service (SaaS) services featuring software for contractual rights management and royalty reporting; software as a service (SaaS) services featuring software for authenticating user identity and authorizing and securing access to remote computers, websites, and software as a service applications; software as a service (SaaS) services featuring software for token-based authentication of user identity for authorizing and securing access to remote computers, websites, and software as a service applications; software as a service (SaaS) services featuring software for providing content management, authentication, identification, management, and analytics for networked devices in the Internet of things (IoT); software as a service (SaaS) services featuring software for connecting, operating, and managing networked devices connected to cloud-based software in the Internet of things (IoT); software as a service (SaaS) services featuring software for the creation and maintenance of secure Internet of things (IoT) ecosystems, namely, software for managing a certificate authority for networked devices and applications, managing identifiers and encryption key material; software as a service (SaaS) services featuring software for authentication and secure bootstrap, provisioning and updating of devices and software in the Internet of things (IoT); software as a service (SaaS) services featuring software for device certificate management and secure device to cloud communication; software as a service (SaaS) services featuring software for device certificate management and secure device to cloud communication based on a PKI hierarchy; software as a service (SaaS) services featuring software for monitoring devices for viruses and other malware threats and controlling device access to software and services; software as a service (SaaS) services featuring software for end-to-end encryption of data from devices, to Internet of things (IoT) applications, and to cloud storage services; engineering services; computer hardware design and development services; computer software design and development services; design and development of computer hardware and software solutions for the security of mobile apparatus, connected objects and apparatus; design and development of computer hardware and software solutions for the protection of transactions, exchanges of computer data and data contained in electronic apparatus, particularly mobile apparatus, connected apparatus and connected objects; development of programs for computers and microprocessors; computer programming services, namely, microprocessor programming services; computer programming services; design, development and technical study of computer systems; design, development and technical study of data exchange systems in the nature of computer systems; design and development of programs for data encryption and decryption; computer system analysis; technical assistance being troubleshooting of computer and software security problems in the field of data communication, namely, diagnosis and repair of software; remote monitoring services for computer systems to ensure proper and secure functioning; design, development, customization and updating of computer software and programs; research and development of new products for others; computer software consulting services; computer security consultancy services; computer technology consultancy services; information technology (IT) consulting services; information, consultancy and consulting services in the field of telecommunications technology security and communications technology security; and information, consultancy and consulting services in the field of computer technology security, namely, transaction security, exchanges of computer data and data contained in electronic apparatus, particularly mobile apparatus, connected apparatus and connected objects;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention relates to a telecommunications system and method for providing a plurality of services, the services providing control for communication via the telecommunications system. The system comprises a switching point for triggering one or more services of said plurality of services for a communication. Each of the services may reserve at least one control characteristic. A service manager connected to the switching point is arranged to determine if at least two services can be provided for the communication based on information relating to control characteristics of said at least two services. A new service can be started only if the control characteristics it requires are not reserved by a previously invoked service. A service manager for use in a telecommunication system for managing the plurality of services is also disclosed.