COMPUTER GROUPWARE EXCHANGING IDEAS

Brand Owner Address Description
WE-IQ BENCHMARK COMMUNICATIONS, INC. 5 Shorehaven Road Norwalk CT 06855 Computer groupware for exchanging ideas about communications for business and personal relationships, learning more effective skills, relating to business management and leadership development; Computer software for communicating with users of hand-held computers; Computer software for exchanging ideas about communications for business and personal relationships, learning more effective skills, relating to business management and leadership development that may be downloaded from a global computer network; Computer software platforms for exchanging ideas about communications for business and personal relationships, learning more effective skills, relating to business management and leadership development; Downloadable computer software for exchanging ideas about communications for business and personal relationships, learning more effective skills, relating to business management and leadership development; Downloadable mobile applications for exchanging ideas about communications for business and personal relationships, learning more effective skills, relating to business management and leadership development; Downloadable software in the nature of a mobile application for exchanging ideas about communications for business and personal relationships, learning more effective skills, relating to business management and leadership development;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An improved electronic lock system is provided for use with real estate lock boxes. Each user has an identification card with a non-volatile secure memory for exchanging data with the lock box, and for exchanging data with a central computer. The user first inserts the card into a connector at the lock box, or at the central computer. The lock box or central computer must first enable (or unlock) the data in the card memory, and then can read the data stored in that card's memory and record this information in lock box memory. The card must then identify itself, and the user must identify himself/herself to the lock box or central computer. After the identification information is authenticated, the user can enter commands to the lock box; e.g., an access code is manually keyed into the lock box keypad by the user to obtain access to a secure compartment.