COMPUTER SOFTWARE SECURELY MANAGING

Brand Owner (click to sort) Address Description
ARMORY ARMORY TECHNOLOGIES, INC. 8160 Maple Lawn Blvd, Suite 200 Fulton MD 207592522 Computer software for securely managing digital currencies;
CASASCIUS Casascius 41 Wanderwood Way Sandy UT 84092 Computer software for securely managing digital currencies;Collectible coins;The word(s) CASASCIUS has no meaning in a foreign language.;
ETELLIGENT NETEGRITY, INC. 201 Jones Road Waltham MA 02451 Computer software for securely managing access to, and use of, computer networks and global computer networks.;
IDENTIPHI IDENTIPHI Suite 275 13809 Research Blvd. Austin TX 78750 Computer software for securely managing digital credentials and authenticating a person's identity; computer software for storing and managing computer software application credentials and passwords and securely and automatically submitting proper login credentials to computer software applications without user intervention; computer software for encrypting and decrypting computer data; computer identity and password management software; user documentation sold as a unit therewith;IDENTIFY;
SECURITY.COM NETEGRITY, INC. 201 Jones Road Waltham MA 02451 Computer software for securely managing and personalizing portals for use with computer networks and global computer networks;SECURITY;Computer consultation, namely consultation in the field of global computer networks, namely, assisting in securely managing and personalizing portals;
SMART NETEGRITY, INC. 201 Jones Road Waltham MA 02451 Computer software for securely managing access to, and use of, computer networks and global computer networks.;
SMARTBENCH NETEGRITY, INC. 201 Jones Road Waltham MA 02451 Computer software for securely managing access to, and use of, computer networks and global computer networks;SMART BENCH;
VAULTLETFILER R. P. Ruiz 1801 Clydesdale P1 NW, Apt 722 Washington DC 20009 Computer software for securely managing, distributing and protecting electronic data files of any type using encryption, decryption, signing and authentication, among other techniques; for performing the above actions in a platform and location independent manner; Software is designed to be used on both networked, which includes the global computer network, and standalone computing devices;VAULT LET FILER;
VAULTLETMAIL R. P. Ruiz 1801 Clydesdale P1 NW, Apt 722 Washington DC 20009 Computer software for securely managing, creating, editing, querying, viewing, distributing and protecting email using encryption, decryption, signing and authentication, among other techniques;VAULT LET MAIL;
WEBLOGIN ASSISTANT Ruiz, R. P. 1801 Clydesdale Pl NW, Apt 722 Washington DC 20009 Computer software for securely managing, creating, editing, querying, viewing, distributing and protecting accounts, passwords and URLs necessary to facilitate or automate web logins using encryption, decryption, signing and authentication, among other techniques; for performing the above actions in a platform and location independent manner; Software is designed to be used on both networked, which includes the global computer network, and standalone computing devices;WEB LOG IN ASSISTANT;WebLogin;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention provides a confidential information management system which allows users to securely obtain confidential information files containing various confidential information, which files are securely stored in the present system, anywhere and anytime, using a minimum of confidential information. A confidential information file and encoding/decoding software are downloaded to an information terminal from a confidential information managing server and an encoding/decoding software managing server, respectively, so that the confidential information file is decoded on the information terminal by using the encoding/decoding software. The present system is applicable to various (computer) systems which store and manage confidential information (ID numbers, passwords, encryption keys, digital certificates, etc.) for use in user verification.