COMPUTER SOFTWARE USED AUTHENTICATE

Brand Owner (click to sort) Address Description
ABSOLUTEPROOF Surety 12020 Sunrise Valley Drive, Suite 250 Reston VA 20191 computer software used to authenticate electronic records through a cryptographically verifiable notarization and time stamping process;computer services used to validate electronic data integrity through a cryptographically verifiable notarization and time stamping process;
ABSOLUTEPROOF Worldgate Management 12950 Worldgate Drive Suite 150 Herndon VA 20170 computer software used to authenticate electronic records through a cryptographically verifiable notarization and time stamping process;computer services used to validate electronic data integrity through a cryptographically verifiable notarization and time stamping process;
THINK SECURITY COGNETO LIMITED 1 BERKELEY STREET LONDON W1J 8DJ United Kingdom COMPUTER SOFTWARE USED TO AUTHENTICATE AND VERIFY AN INDIVIDUAL BASED ON RECORDED AND UNRECORDED LIFE EXPERIENCE AND PREFERENCE INFORMATION STORED IN THE INDIVIDUAL BRAIN;SECURITY;
THINK SECURITY QUEUE GLOBAL INFORMATION SYSTEMS CORP. SUITE 702 - 889 WEST PENDER STREET VANCOUVER, BRITISH COLUMBIA V6C 2B3 Canada COMPUTER SOFTWARE USED TO AUTHENTICATE AND VERIFY AN INDIVIDUAL BASED ON RECORDED AND UNRECORDED LIFE EXPERIENCE AND PREFERENCE INFORMATION STORED IN THE INDIVIDUAL BRAIN;SECURITY;
WETMETRICS COGNETO LIMITED 1 BERKELEY STREET LONDON W1J 8DJ United Kingdom Computer software used to authenticate and verify an individual based on recorded and unrecorded life experience and preference information stored in the individual brain; Computer software designed to authenticate and verify an individual based on recorded and unrecorded life experience and preference information stored in the individual brain;WET METRICS;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An automated banking machine is operative to authorize the installation, use, and/or configuration of ATM software applications and components. The machine may be provided with either an authorization key or a configuration certificate that is generated by a licensing authority. The machine is operative to authenticate the key or certificate prior to granting a user permission to install, run, and/or configure the software. The machine is operative to authenticate a configuration certificate by evaluating a digital signature associated with the configuration certificate. An authorization key may be authenticated by comparing it to a second authorization key generated responsive to inputted license information and one-way hash functions. The key or certificate may be associated with a plurality of configuration rules which specify the configuration software components and parameters for specific ATM software and hardware.