COMPUTER SOFTWARE AUTHENTICATING USERS

Brand Owner (click to sort) Address Description
EVINCIBLE CyberElan.com 4451 Brookfield Corporate Drive Suite 206 Chantilly VA 20151 COMPUTER SOFTWARE FOR AUTHENTICATING USERS AND MANAGING CONTENT ACCESS, NAMELY, PRIVILEGE MANAGEMENT TO CONTENT VIA ENCRYPTION SYSTEMS, KEY MANAGEMENT SYSTEMS, AND AUTHENTICATION SYSTEMS, AND COMPUTER SOFTWARE FOR PROVIDING ACCOUNTABILITY FOR ELECTRONIC TRANSACTIONS VIA DIGITAL SIGNATURES, DIGITAL CERTIFICATES, DIGITAL NOTARY, AND DIGITAL RECEIPT FUNCTIONALITY;In the statement, Column 1, before line 1, ENVERUS, LLC (VIRGINIA, LIMITED LIABILITY COMPANY) 1800 ALEXANDRIA BELL DRIVE SUITE 400 RESTON, VA 20191 should be inserted.;COMPUTER SOFTWARE DEVELOPMENT SERVICES, NAMELY, DEVELOPMENT OF DATABASE, NETWORK AND TRANSACTIONAL SECURITY SOFTWARE;
GEOACL GEOACL 74 Corona Ct Old Bridge NJ 08857 Computer software for authenticating users and authorizing request for all kinds of accounts including bank accounts, investment accounts, trading accounts, bank and monetary cards like credit/debit/prepaid/virtual cards, Email, IM, Social Network, Healthcare Data, Employment Data, Cloud Storage, Cloud based Services, financial transactions and payment transactions for ecommerce, Self-Service terminals and retail shopping;Software as a service (SAAS) services featuring software for authenticating users and authorizing request for all kinds of accounts including bank accounts, investment accounts, trading accounts, bank and monetary cards like credit/debit/prepaid/virtual cards, Email, IM, Social Network, Healthcare Data, Employment Data, Cloud Storage, Cloud based Services, financial transactions and payment transactions for ecommerce, Self-Service terminals and retail shopping;
WIKID SYSTEMS WiKID Systems, Inc. 817 W. Peachtree St, Suite 205 Atlanta GA 30308 Computer software for authenticating users;WICKED SYSTEMS;
WINSUITE ndi Technologies Ltd. Dacoll House Gardners Lane, Bathgate West Lothian EH48 1TP United Kingdom Computer software for authenticating users and for controlling and restricting access to programs, documents, and other computer files;WIN SUITE;
ZTBROWSER ERICOM SOFTWARE LTD. Har Hotzvim, Technology Park 12 Hartom Street, POB 45122 Jerusalem 9777512 Israel Computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies; and for protecting computer systems, networks, data, and software from viruses, malware, and web-based threats; segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;ZT BROWSER;Cloud Computing Software as a service (SaaS) for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies; and for protecting computer systems, networks, data, and software from viruses, malware, and web-based threats; segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for signing, sorting, and authenticating electronic documents using public key cryptography. The system comprises a document service computer cluster connected to user computers, document owner server computers, and registration computers via a network such as for example, the internet or the world wide web. Document owners and system users can store electronic documents in an encrypted database located on the document service computer cluster, or on a document safe connected to the document owner server. Users can sign documents by identifying the document to be signed and sending a signing request to the document service computer cluster. The document service computer cluster retrieves the user's private key, which is located securely in a database on the cluster, and signs the identified document. No dedicated signing software need be installed on the user computer prior to accessing the document service computer cluster.