COMPUTER SOFTWARE DETECTION

Brand Owner (click to sort) Address Description
A HIGHER CODE Coverity, Inc. 185 Berry Street, Ste. 2400 San Francisco CA 94107 Computer software for detection of defects in security system software and for evaluation of reliability of security system software;CODE;
ACCUSLEUTH NETSURION 7324 SOUTHWEST FREEWAY HOUSTON TX 77074 Computer software for the detection of sensitive data, particularly to help identify and ultimately remove data prohibited by security standards;
ARMORER LOGBOOK Rade Tecnologias, S.L. AVDA. VALDELAPARRA 27, EDIF. II, LOCAL 8 Alcobendas (Madrid) 28108 Spain Computer software for the detection, acquisition, and synchronization of events within database, in the field of firearms; Data communications hardware, namely, communication servers for the detection, acquisition, and synchronization of events and records within database; downloadable computer software applications for the detection, acquisition, and synchronization of events within database, in the field of firearms;
ASSETVUE eIQnetworks, Inc. 35 Nagog Park, 1st Floor Acton MA 01720 Computer software for detection and inventory of IT assets within a network, collection of information about detected IT assets, inventory, monitoring and reporting on information about the IT assets, including applications and processes running on each IT asset and assets hardware specifications;
ASSUREDSCANDKV Assured Enterprises, Inc. 8300 Boone Boulevard Vienna VA 22182 Computer software for the detection of known software vulnerabilities residing/hidden within an IT Infrastructure, software or software applications; Computer software for identifying remedial action needed to eliminate detected vulnerabilities in software residing on an IT environment; Computer software for use in computer, data, and mobile device security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer software for use in cloud security, namely, software for scanning and detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Cybersecurity software, namely, software for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities and prioritizing the order in which the vulnerabilities ought to be eliminated; Computer programs for detecting known software vulnerabilities residing/hidden within an IT environment, reporting detailed information about the known vulnerabilities, and the vulnerabilities' criticality, identifying remedial action necessary to eliminate such vulnerabilities, and prioritizing the order in which the vulnerabilities ought to be eliminated; Downloadable reports featuring information regarding cybersecurity; Downloadable reports featuring information regarding computer, data, and mobile device security; Downloadable reports featuring information regarding cloud security; Downloadable reports concerning the detection of software vulnerabilities in an IT environment, information regarding the vulnerabilities and their criticality, the remedial action necessary to eliminate such vulnerabilities, recommendations regarding the order in which to eliminate the vulnerabilities and information regarding potential cyberattacks;ASSURED SCAN DKV;
BIORADAR Bogoch Family 46 East 91 Street New York NY 10128 computer software for detection of chemical and biological agents hazardous or lethal to biological entities; test kits for detecting biological agents hazardous or lethal to biological entities consisting primarily of electronic detectors for use in detecting bacteria, viruses, organic materials, microbes;test kits for detecting biological agents hazardous or lethal to biological entities consisting primarily of clinical medical reagents, swabs, test strips and receptacles;BIOLOGICAL RADAR;
BRIGHT LIGHT TECHNOLOGIES Bright Light Technologies, Inc. 651 Brannan Street Third Floor San Francisco CA 94107 computer software for the detection, blocking, filtering or modification of electronic mail messages;TECHNOLOGIES;
BRIGHTMAIL SYMANTEC CORPORATION 350 Ellis Street Mountain View CA 94043 computer software for the detection, blocking, filtering or modification of unsolicited, bulk, and/or junk electronic messages;BRIGHT MAIL;
BRIGHTMAIL BRIGHTMAIL, INC. Suite 1800 301 Howard Street San Francisco CA 94105 computer software for the detection, blocking, filtering or modification of unsolicited, bulk, and/or junk electronic messages;BRIGHT MAIL;
CAL THREATCONNECT, INC. 3865 Wilson Blvd, Suite 550 Arlington VA 22203 Computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; downloadable software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing;Providing a website featuring temporary use of on-line non-downloadable computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; computer security consultancy in the field of risk assessment and information security, computer consultation in the field of computer security and internet security, and computer security consultancy in the field of cyber threat analysis, threat intelligence, security operations and incident response; providing temporary use of non-downloadable hosted computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing;
CALTRAN C-FER TECHNOLOGIES (1999) INC. 200 Karl Clark Road Edmonton Alberta T6N1H2 Canada computer software for the detection, description, and analysis of deformations in pipes, tubes and casings used in the oil and gas industries;
CYBER SQUARED Cyber Squared Inc. 1100 North Glebe Road, Suite 1010 Arlington VA 22201 Computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; downloadable computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; none of the aforementioned goods including hardware and software for processing credit card, debit card, gift card and other payment transactions via mobile devices;CYBER;Providing a website featuring temporary use of on-line non-downloadable computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; none of the aforementioned services including reconciling, processing, or providing electronic transmission of credit card, debit card, gift card and other payment transactions and transaction data via a global computer network;
DEPOSIT FRAUD MANAGER Banker's Toolbox, Inc. Building4 Suite 200 12331-B Riata Trace Parkway Austin TX 78727 Computer software for the detection, monitoring and analysis of irregularities in deposit trends to determine potential fraud activity;
EMSISOFT EMSISOFT, LTD. 315a Hardy Street NELSON 7010 New Zealand Computer software for detection and protection of malicious code; computer software for ensuring security of electronic mail and for removal of computer viruses in the field of security tools;
FAULT (FAULT ANALYSIS AND UNDERGROUND LOCATION TECHNIQUE) Electric Power Research Institute 3420 Hillview Ave. Palo Alto CA 94304 computer software for the detection of underground electric cable breaks or inconsistencies;FAULT ANALYSIS AND UNDERGROUND LOCATION TECHNIQUE;
FAULT (FAULT ANALYSIS AND UNDERGROUND LOCATION TECHNIQUE) Electric Power Research Institute 3420 Hillview Ave. Palo Alto CA 94304 computer software for the detection of underground electric cable breaks or inconsistencies;
FLEX (FAULT LOCATION EXPERT SYSTEM) Electric Power Research Institute 3420 Hillview Ave. Palo Alto CA 94304 computer software for the detection of underground electric cable breaks or inconsistencies;FAULT LOCATION EXPERT SYSTEM;
FLYING SQUIRREL Department of the Navy of the United States 875 N Randolph St Arli Washington DC 20375 Computer software for the detection and analysis of wireless networks;
FOR ANALYSTS, BY ANALYSTS THREATCONNECT, INC. 3865 Wilson Blvd, Suite 550 Arlington VA 22203 Computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; downloadable software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing;Providing a website featuring temporary use of on-line non-downloadable computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; computer security consultancy in the field of risk assessment and information security, computer consultation in the field of computer security and internet security, and computer security consultancy in the field of cyber threat analysis, threat intelligence, security operations and incident response; providing temporary use of non-downloadable hosted computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing;
FRAUD CURE Fraud Cure 3960 Howard Hughes Pkwy. Suite 500 Las Vegas NV 89169 Computer software for detection, prevention, deterrence and remediation of fraudulent activity related to authorized and unauthorized credit card, electronic and/or alternate payments transactions;FRAUD;
GR2C Greenlight Technologies Inc. 270 S. Main St Flemington NJ 08822 Computer software for the detection and prevention of internal control risks and the automation of regulatory compliance in businesses that utilize an enterprise resource planning system;
HARMONIZER Manufacturing Laboratories, Inc. 889 South Rainbow Boulevard Suite 690 Las Vegas NV 89145 Computer software for detection and avoidance of chatter in machine tools;
INFECTICIDE PRO IOLO TECHNOLOGIES 7470 N. Figueroa St. Los Angeles CA 90041 COMPUTER SOFTWARE FOR DETECTION AND REMOVAL OF MALICIOUS SOFTWARE AND VIRUSES;COMPUTER SERVICES FOR THE DETECTION AND REMOVAL OF MALICIOUS SOFTWARE AND VIRUSES; PROVIDING TEMPORARY USE OF ON-LINE NON-DOWNLOADABLE SOFTWARE FOR DETECTION AND REMOVAL OF MALICIOUS SOFTWARE AND VIRUSES;
INSIDERASSESS Soteritech 6142 Aurora Avenue WARRENTON VA 20187 Computer software for detection of potential insider threats to private, military, and civilian industry intellectual property;INSIDER ASSESS;
INVINCEA Invincea, Inc. 3975 University Drive, Suite 460 Fairfax VA 22030 Computer software for detection of web-borne malware in computer desktop web browers, and analyzing risk to, and maintaining the security of, computer desktop web browsers;
M MailFront, Inc. 425 Sherman Avenue, Suite 220 Palo Alto CA 94306 computer software for the detection, blocking, filtering and modification of unsolicited, bulk, and junk electronic messages; computer security software for use in securing and encrypting data stored on personal digital assistants, for use in controlling and limiting access to on-line databases containing escrow accounts information; firewall software for protecting computer systems from unauthorized access and use; computer software for network management, protection and recovery from computer viruses, copy protection, transferring data between portable computer devices and desktop and networked computers, and for linking text records with electronic images; computer utility and antivirus software; computer software for allowing electronic mail and online communications and messaging; computer communications software for connecting local area networks, internal corporate networks, and file and proxy servers; and parts and fittings for all the aforesaid goods;MAIL FRONT;The stippling is for shading purposes only.;
MAILFRONTIER MAILFRONTIER, INC. 1143 Borregas Ave. Sunnyvale CA 94089 computer software for the detection, blocking, filtering and modification of unsolicited, bulk, and junk electronic messages; computer security software; fire wall software; computer software for network management, protection and recovery from computer viruses, copy protection, transferring data between portable computer devices and desktop and networked computers, and for linking text records with electronic images; computer utility and antivirus software; computer software for use with electronic mail and online communications and messaging, local area network, internal corporate network, file and proxy servers; parts and fittings for all the aforesaid goods;
MAKING SPAM HISTORY BRIGHTMAIL, INC. Suite 1800 301 Howard Street San Francisco CA 94105 Computer software for the detection, blocking, filtering or modification of unsolicited, bulk, and/or junk electronic messages.;
MATADOR MAILFRONTIER, INC. 1143 Borregas Ave. Sunnyvale CA 94089 Computer software for the detection, blocking, filtering and modification of unsolicited, bulk, and junk electronic messages; computer software for network management, protection and recovery from computer viruses, copy protection, transferring data between portable computer devices and desktop and networked computers, and for linking text records with electronic images; computer utility and antivirus software; computer communications software for allowing electronic mail and online communications and messaging; computer communications software for connecting local area networks, internal corporate networks, and file and proxy servers;
MENDEL MINRES Technologies GmbH Keltenhof 2 85579 Neubiberg Germany Computer software for the detection, collection, organization, analysis, integration, transmission, storage and/or sharing of data and information;industrial analysis and research services relating to computer software and hardware, computer systems; scientific research and development;
PERCEPTUAL VOX Vocaltec Ltd. 1 Hamaskit Street Herzlia Israel computer software for detection of voice activity;VOX;
PREDICTIVEFRAUD SPSS INC. 11th Floor 233 S. Wacker Drive Chicago IL 60606 Computer software for detection of customer related fraud by generating quantitative models from analysis of historical data and applying models to current data;PREDICTIVE FRAUD;
RANGER Subex Systems Limited 721, 7th Main Mahalaxmi Layout Bangalore 560 086 India Computer software for detection of unauthorized use of proprietary telecommunications and data networks, and on global computer networks;
RANGER Subex Systems Limited 721, 7th Main Mahalaxmi Layout Bangalore 560 086 India Computer software for detection of unauthorized use of proprietary telecommunications and data networks, and on global computer networks;
REPLIKINS BIORADAR GLOBAL SURVEILLANCE SYSTEM Bogoch Family 46 East 91 Street New York NY 10128 Computer software for detection of chemical and biological agents hazardous or lethal to biological entities; test kits for detecting biological agents hazardous or lethal to biological entities consisting primarily of electronic detectors for use in detecting bacteria, viruses, organic materials and microbes;GLOBAL SURVEILLANCE SYSTEM;
RISEUP DRONE DEFEND RISEUP DRONE DEFEND, INC. 3940 LAUREL CANYON BLVD SUITE 385 STUDIO CITY CA 91604 Computer software for the detection, tracking, alerting and interdiction of drones and small Unmanned Aerial Vehicles (UAVs); Drone detection and control equipment, namely, computers, image sensors, video camera, gps tracking devices, and operating systems and application software to detect and control vehicles/drones;DRONE;Scientific, technological, and engineering services in the field of physical security, drone detection systems, intrusion detection systems, aerial defenses, and physical barriers; Technical consultation services in the field of design, selection, implementation and use of computer hardware, computer peripherals and computer software, commercial surveillance systems, drone surveillance systems; Software as a service (SAAS) services featuring software for detecting, identifying, and monitoring drones and unmanned aerial vehicles;
RISEUP DRONE DEFEND RiseUp Technologies, Inc. 3940 Laurel Canyon Blvd Suite 385 Studio City CA 91604 Computer software for the detection, tracking, alerting and interdiction of drones and small Unmanned Aerial Vehicles (UAVs); Drone detection and control equipment, namely, computers, image sensors, video camera, gps tracking devices, and operating systems and application software to detect and control vehicles/drones;DRONE;Scientific, technological, and engineering services in the field of physical security, drone detection systems, intrusion detection systems, aerial defenses, and physical barriers; Technical consultation services in the field of design, selection, implementation and use of computer hardware, computer peripherals and computer software, commercial surveillance systems, drone surveillance systems; Software as a service (SAAS) services featuring software for detecting, identifying, and monitoring drones and unmanned aerial vehicles;
THREATCONNECT THREATCONNECT, INC. 3865 Wilson Blvd, Suite 550 Arlington VA 22203 Computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing; downloadable computer software for the detection of Internet threats, espionage and attacks, and for providing secure transmission of communications, data, sound and images via computer networks, the Internet, and Internet cloud computing;THREAT CONNECT;
TOTAL RF AWARENESS 3dB Labs, Inc. 7083 Birch Hollow Ln West Chester OH 45069 Computer software for detection and copy of radio frequency signals; Computer software platforms for detection and copy of radio frequency signals;TOTAL RADIO FREQUENCY AWARENESS;RF;
TRUECARDS Advanced Fraud Solutions 4100 Mendenhall Oaks Pkwy Ste 130 High Point NC 27265 Computer software for detection of fraudulent credit card transactions;TRUE CARDS;
TRUECHECKS Advanced Fraud Solutions 4100 Mendenhall Oaks Pkwy Ste 130 High Point NC 27265 Computer software for detection of counterfeit checks;TRUE CHECKS;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention relates to the field of tone detection and, more particularly, to the detection of dual tone multi-frequency (DTMF) tones in software based telecommunications systems. As modem telecommunications systems are becoming increasingly software based and typically require only a minimum of physical hardware, much of the necessary telecommunication functionality is now provided by software functions running on powerful computer servers. A common function which is required to be performed by telecommunications systems is that of dual tone multi-frequency (DTMF) detection. Accordingly, the present invention aims to provide an efficient software-based DTMF detection system that satisfies the ever increasing need for efficient software functions.