COMPUTER SOFTWARE USED IDENTIFY

Brand Owner (click to sort) Address Description
CAREER PRESCRIPTION EMPLOYMENT TECHNOLOGIES CORPORATION 532 S. New York Avenue Winter Partk FL 32789 Computer software used to identify an individual employee training plan after assessment and evaluation of employee job skills in the field of employee development, and instruction manuals related thereto, to be sold as a unit;
COMPLIANCEADVANTAGE American Practice Risk Assessment Corp. 1825 I Street, N.W. Washington DC 20006 COMPUTER SOFTWARE USED TO IDENTIFY THE RISK OF FRAUD AND ABUSE, FALSE BILLING, AND LIABILITY IN THE FIELD OF HEALTHCARE;PRINTED PUBLICATIONS ON THE FORM OF PAMPHLETS, BROCHURES, NEWSLETTERS, JOURNALS, AND MAGAZINES ON THE SUBJECT OF THE RISK OF FRAUD AND ABUSE, FALSE BILLING, AND LIABILITY IN THE FIELD OF HEALTHCARE;COMPLIANCE ADVANTAGE;
COVERITY ARCHITECT Coverity, Inc. 185 Berry Street, Ste. 2400 San Francisco CA 94107 Computer software used to identify and analyze dependencies among complex source code and software subsystems;
CSA SECURE REALPAGE UTILITY MANAGEMENT INC. 2201 Lakeside Blvd. Richardson TX 75082 Computer software used to identify, track, and report whether renting tenants have assumed responsibility for their utility accounts.;
DIAGNOSIS REVIEW Health Payment Review, Inc. 360 Newbury Street Boston MA 02115 computer software used to identify inappropriate medical services prior to payment of insurance claims and user manuals all sold as a unit;
DR/XPERT ROCKET SOFTWARE, INC. 77 4th Avenue Waltham MA 02451 Computer software used to identify critical company data stored on tape or Dasd, create backup copies of the identified critical data and automate the recovery of those backups;DISASTER RECOVERY/EXPERT;
DRONEDNA Dedrone Holdings, Inc. 6th Floor 220 Sansome Street San Francisco CA 94104 Computer software used to identify remotely operated devices and associated control systems;DRONE DNA;Software as a service (SAAS) services, namely, hosting software used to identify remotely operated devices and associated control systems;
EFFORTCHECK ENACT HEALTH MANAGEMENT SYSTEMS, INC. 1975 EL CAMINO REAL WEST, STE. 30 MOUNTAIN VIEW CA 94040 Computer software used to identify unacceptable measurement attempts by individuals using respiratory monitors and instruction manual for use therewith, sold as a unit;EFFORT CHECK;
ID EST UDR Technologies 2331 Hansen Court Tallahassee FL 32301 Computer software used to identify and authenticate owners of unclaimed property;The English translation of the term ID EST is THAT IS.;
IDENTIKEY ONESPAN NORTH AMERICA INC. 121 W Wacker Drive, Suite 2050 Chicago IL 60601 COMPUTER SOFTWARE USED TO IDENTIFY AND AUTHENTICATE USERS OF INTRANET AND INTERNET WEBSITES AND USED TO AUTHENTICATE USER ACCESS TO INTRANET AND INTERNET SITES, WIDE AREA NETWORKS (WAN) AND LOCAL AREA NETWORKS (LAN) IN ORDER TO SECURE ONLINE COMMUNICATIONS AND TRANSACTIONS; [ ELECTRONIC PUBLICATIONS FOR BUSINESS, HOME AND EDUCATIONAL USE NAMELY MULTI-MEDIA REFERENCE BOOKS FEATURING INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS RECORDED ON CD-ROM, FLOPPY DISKS, HARD DISKS AND DIGITAL VERSATILE DISKS; COMPUTER PROGRAMS FOR PROVIDING ACCESS TO AND MANAGING WIRELESS COMMUNICATION NETWORKS; COMPUTER SOFTWARE USED TO ACCESS AND DISPLAY INFORMATION OBTAINED OVER A GLOBAL COMPUTER NETWORK, NAMELY, NEWS, ENTERTAINMENT, TRAFFIC AND INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS; COMPUTER SOFTWARE WHICH PROVIDES ENHANCED AUDIO AND VIDEO FEATURES TO OPTICAL DISC PLAYERS; COMPUTER SOFTWARE FOR FACILITATING TEXT, VOICE, AND PEN INPUT PROCESSING; COMPUTER OPERATING SYSTEM PROGRAMS AND COMPUTER UTILITY PROGRAMS; ELECTRONIC MAIL SOFTWARE; NOTE TAKING PROGRAMS; COMPUTER PROGRAMS FOR MAPPING AND NAVIGATION; COMPUTER PROGRAMS USED FOR MAINTAINING PERSONAL DIRECTORIES, ADDRESS, TELEPHONE AND CONTACT LISTS; COMPUTER SOFTWARE USED FOR MONITORING VEHICLE PERFORMANCE; COMPUTER PROGRAMS USED TO OPERATE PHONES AND PAGERS; COMPUTER SOFTWARE FOR WALLET-SIZED PERSONAL COMPUTERS FEATURING PERSONAL INFORMATION MANAGER PROGRAMS WITH CALENDARS, DIARIES, INFORMATION FILES AND AGENDA LISTS, AND FOR USE AND IN THE DEVELOPMENT OF OTHER PROGRAMS FOR WALLET-SIZED PERSONAL COMPUTERS; OPERATING SYSTEMS, UTILITY PROGRAMS AND BUSINESS APPLICATION PROGRAMS FOR USE WITH HAND-HELD COMPUTERS; MANUALS SOLD AS A UNIT WITH THE FOREGOING; MEMORY STORAGE DEVICES NAMELY HARD DISK DRIVES, CD-ROMS, FLOPPY DISKS, AND DIGITAL VERSATILE DISKS ];IDENTIFICATION KEY;
IDENTIKEY IDENTIKEY HOLDINGS PTY LIMITED 143 Coronation Drive, Level I Milton, Queensland 4064 Australia COMPUTER SOFTWARE USED TO IDENTIFY AND AUTHENTICATE USERS OF INTRANET AND INTERNET WEBSITES AND USED TO AUTHENTICATE USER ACCESS TO INTRANET AND INTERNET SITES, WIDE AREA NETWORKS (WAN) AND LOCAL AREA NETWORKS (LAN) IN ORDER TO SECURE ONLINE COMMUNICATIONS AND TRANSACTIONS; [ ELECTRONIC PUBLICATIONS FOR BUSINESS, HOME AND EDUCATIONAL USE NAMELY MULTI-MEDIA REFERENCE BOOKS FEATURING INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS RECORDED ON CD-ROM, FLOPPY DISKS, HARD DISKS AND DIGITAL VERSATILE DISKS; COMPUTER PROGRAMS FOR PROVIDING ACCESS TO AND MANAGING WIRELESS COMMUNICATION NETWORKS; COMPUTER SOFTWARE USED TO ACCESS AND DISPLAY INFORMATION OBTAINED OVER A GLOBAL COMPUTER NETWORK, NAMELY, NEWS, ENTERTAINMENT, TRAFFIC AND INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS; COMPUTER SOFTWARE WHICH PROVIDES ENHANCED AUDIO AND VIDEO FEATURES TO OPTICAL DISC PLAYERS; COMPUTER SOFTWARE FOR FACILITATING TEXT, VOICE, AND PEN INPUT PROCESSING; COMPUTER OPERATING SYSTEM PROGRAMS AND COMPUTER UTILITY PROGRAMS; ELECTRONIC MAIL SOFTWARE; NOTE TAKING PROGRAMS; COMPUTER PROGRAMS FOR MAPPING AND NAVIGATION; COMPUTER PROGRAMS USED FOR MAINTAINING PERSONAL DIRECTORIES, ADDRESS, TELEPHONE AND CONTACT LISTS; COMPUTER SOFTWARE USED FOR MONITORING VEHICLE PERFORMANCE; COMPUTER PROGRAMS USED TO OPERATE PHONES AND PAGERS; COMPUTER SOFTWARE FOR WALLET-SIZED PERSONAL COMPUTERS FEATURING PERSONAL INFORMATION MANAGER PROGRAMS WITH CALENDARS, DIARIES, INFORMATION FILES AND AGENDA LISTS, AND FOR USE AND IN THE DEVELOPMENT OF OTHER PROGRAMS FOR WALLET-SIZED PERSONAL COMPUTERS; OPERATING SYSTEMS, UTILITY PROGRAMS AND BUSINESS APPLICATION PROGRAMS FOR USE WITH HAND-HELD COMPUTERS; MANUALS SOLD AS A UNIT WITH THE FOREGOING; MEMORY STORAGE DEVICES NAMELY HARD DISK DRIVES, CD-ROMS, FLOPPY DISKS, AND DIGITAL VERSATILE DISKS ];IDENTIFICATION KEY;
IDENTIKEY Identikey Pty Ltd Unit 2, 29 McDougall Street Milton Queensland 4064 Australia COMPUTER SOFTWARE USED TO IDENTIFY AND AUTHENTICATE USERS OF INTRANET AND INTERNET WEBSITES AND USED TO AUTHENTICATE USER ACCESS TO INTRANET AND INTERNET SITES, WIDE AREA NETWORKS (WAN) AND LOCAL AREA NETWORKS (LAN) IN ORDER TO SECURE ONLINE COMMUNICATIONS AND TRANSACTIONS; [ ELECTRONIC PUBLICATIONS FOR BUSINESS, HOME AND EDUCATIONAL USE NAMELY MULTI-MEDIA REFERENCE BOOKS FEATURING INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS RECORDED ON CD-ROM, FLOPPY DISKS, HARD DISKS AND DIGITAL VERSATILE DISKS; COMPUTER PROGRAMS FOR PROVIDING ACCESS TO AND MANAGING WIRELESS COMMUNICATION NETWORKS; COMPUTER SOFTWARE USED TO ACCESS AND DISPLAY INFORMATION OBTAINED OVER A GLOBAL COMPUTER NETWORK, NAMELY, NEWS, ENTERTAINMENT, TRAFFIC AND INFORMATION RELATING TO COMPUTER SOFTWARE AND INFORMATION RELATING TO SECURITY IN COMMUNICATION SYSTEMS AND IDENTIFICATION AND AUTHENTICATION OF USERS OF COMMUNICATION SYSTEMS; COMPUTER SOFTWARE WHICH PROVIDES ENHANCED AUDIO AND VIDEO FEATURES TO OPTICAL DISC PLAYERS; COMPUTER SOFTWARE FOR FACILITATING TEXT, VOICE, AND PEN INPUT PROCESSING; COMPUTER OPERATING SYSTEM PROGRAMS AND COMPUTER UTILITY PROGRAMS; ELECTRONIC MAIL SOFTWARE; NOTE TAKING PROGRAMS; COMPUTER PROGRAMS FOR MAPPING AND NAVIGATION; COMPUTER PROGRAMS USED FOR MAINTAINING PERSONAL DIRECTORIES, ADDRESS, TELEPHONE AND CONTACT LISTS; COMPUTER SOFTWARE USED FOR MONITORING VEHICLE PERFORMANCE; COMPUTER PROGRAMS USED TO OPERATE PHONES AND PAGERS; COMPUTER SOFTWARE FOR WALLET-SIZED PERSONAL COMPUTERS FEATURING PERSONAL INFORMATION MANAGER PROGRAMS WITH CALENDARS, DIARIES, INFORMATION FILES AND AGENDA LISTS, AND FOR USE AND IN THE DEVELOPMENT OF OTHER PROGRAMS FOR WALLET-SIZED PERSONAL COMPUTERS; OPERATING SYSTEMS, UTILITY PROGRAMS AND BUSINESS APPLICATION PROGRAMS FOR USE WITH HAND-HELD COMPUTERS; MANUALS SOLD AS A UNIT WITH THE FOREGOING; MEMORY STORAGE DEVICES NAMELY HARD DISK DRIVES, CD-ROMS, FLOPPY DISKS, AND DIGITAL VERSATILE DISKS ];IDENTIFICATION KEY;
INDUSTRIAL LOCATOR Franklin McKee Corporation P.O. Box 38357 639 Alpha Drive Pittsburgh PA 15238 computer software used to identify suppliers of products and services;LOCATOR;
INDUSTRYNET Franklin McKee Corporation P.O. Box 38357 639 Alpha Drive Pittsburgh PA 15238 computer software used to identify suppliers, products and services;INDUSTRY NET;
INSPECT/SQL PRECISE SOFTWARE SOLUTIONS, LTD. 1 Hashikma Street P.O. Box 88 Savyon 56518 Israel computer software used to identify problems within applications utilizing structured query language;SQL;
METAMAP Metamap, Inc. 2001 Gateway Place, Suite 151E San Jose CA 95110 computer software used to identify and compare components of images;
MICROBIOLOGY GOES MOLECULAR APPLERA CORPORATION 850 Lincoln Centre Drive Foster City CA 94404 Computer software used to identify, detect, and characterize bacteria, viruses, fungi, parasites and other organisms; computer software used in collecting, analyzing and managing a database of information pertaining to the identification, detection, and characterization of bacteria, viruses, fungi, parasites, and other organisms;
MY ENTERPRISE WORKPLACE RELEVANT BUSINESS SYSTEMS, INC. Two Annabel Lane, Suite 215 San Ramon CA 94583 computer software used to identify, for each user, work, i.e. projects and tasks, assigned to them and contained in the ERP (Enterprise Resource Planning) system;ENTERPRISE WORKPLACE;
ONCOMATE PROMEGA CORPORATION 2800 Woods Hollow Road Madison WI 537115399 Computer software used to identify and analyze microsatellite instability; computer software for DNA and cancer analysis;
PATHFINDER AppiLog Inc. 225 W. 34th Street, Suite 1506 New York NY 10122 COMPUTER SOFTWARE USED TO IDENTIFY, VISUALIZE AND MANAGE COMPLEX HIERARCHIES OF COMPUTERS, NETWORKS, APPLICATIONS AND DATABASES;
PERSONPRINT TRAPWIRE INC. 1818 Library Street, Suite 500 RESTON VA 20190 Computer software used to identify terrorist or criminal pre-attack planning activities;PERSON PRINT;
PILLFINDER ZINGERY-THRASH 4715 Trailwood San Antonio TX 78228 computer software used to identify unlabeled medications in the form of pills and capsules and for conversion of brand name drugs to generic equivalents;PILL FINDER;
SIGHTLINES DXCG RISK SOLUTIONS VERISK HEALTH, INC. 545 WASHINGTON BOULEVARD JERSEY CITY NJ 07310 Computer software used to identify and quantify healthcare risks for the purposes of predicting risky healthcare events and budgeting healthcare costs;RISK SOLUTIONS;Providing on-line non-downloadable software used to identify and quantify healthcare risks for the purposes of predicting risky healthcare events and controlling healthcare costs;
VEHICLEPRINT TRAPWIRE INC. 1818 Library Street, Suite 500 RESTON VA 20190 Computer software used to identify terrorist or criminal pre-attack planning activities;VEHICLE PRINT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for identifying dependencies of a software program installed on a host computer prior to duplication of the software program from the host computer to a destination computer and for adapting the identified dependencies to the destination computer after duplication. An installed software program can be copied from a host computer to a destination computer without breaking portions of the image that rely on data unique to the computer context in which the software program is installed. Data structures store functionality exposed by a software program during installation of the software program that captures machine-specific data before duplication so that such machine-specific data can be restored properly after the duplication. Software of the invention processes the information in the data structures before and after the duplication process to identify and adapt, respectively, the dependencies.