COMPUTER SOFTWARE SECURE ELECTRONIC

Brand Owner (click to sort) Address Description
ARMORPOST EMAIL PRIVACY & RECALL AutoUptodate 8430 Terrapin Trail, Suite 200 Colorado Springs CO 80919 Computer software for secure electronic information delivery;THE NAME(S), PORTRAIT(S), AND/OR SIGNATURE(S) SHOWN IN THE MARK DOES NOT IDENTIFY A PARTICULAR LIVING INDIVIDUAL.;AMOR POST E MAIL PRIVACY AND RECALL; AMOR POST ELECTRONIC MAIL PRIVACY AND RECALL;EMAIL PRIVACY AND RECALL;
AVOW AVOW SYSTEMS 6021 S. SYRACUSE WAY, SUITE 203 GREENWOOD VILLAGE CO 80111 Computer software for secure electronic document processing and delivery; Computer software which enables document ordering, PDF generation, document authentication, document rights management, document delivery, and document workflow; Computer software for the creation and delivery of authentic documents for higher education, non-profit organizations, commercial organizations, and government organizations;On-line document delivery via a global computer network; electronic transmission of documents via computer terminals;Application service provider, namely, hosting software in the field of secure electronic document processing and delivery for higher education, commercial organizations, non-profit organizations, and government organizations; application service provider, namely, hosting computer software applications for use in electronic document transmission, PDF generation, document authentication, document rights management, electronic document delivery, and document workflow for higher education, commercial organizations, non-profit organizations, and government organizations; computer consultation in the field of design, selection, implementation and use of computer hardware and software systems in the field of secure electronic document processing and delivery for higher education, commercial organizations, non-profit organizations, and government organizations;
AVOW SYSTEMS AVOW SYSTEMS 6021 S. SYRACUSE WAY, SUITE 203 GREENWOOD VILLAGE CO 80111 Computer software for secure electronic document processing and delivery; Computer software which enables document ordering, PDF generation, document authentication, document rights management, document delivery, and document workflow; Computer software for the creation and delivery of authentic documents for higher education, non-profit organizations, commercial organizations, and government organizations;On-line document delivery via a global computer network; electronic transmission of documents via computer terminals;SYSTEMS;Application service provider, namely, hosting software in the field of secure electronic document processing and delivery for higher education, commercial organizations, non-profit organizations, and government organizations; application service provider, namely, hosting computer software applications for use in electronic document transmission, PDF generation, document authentication, document rights management, electronic document delivery, and document workflow for higher education, commercial organizations, non-profit organizations, and government organizations; computer consultation in the field of design, selection, implementation and use of computer hardware and software systems in the field of secure electronic document processing and delivery for higher education, commercial organizations, non-profit organizations, and government organizations;
COPBOX Numerica Corporation 5042 Technology Parkway, Suite 100 Fort Collins CO 80528 Computer software for secure electronic media storage and transmission of sensitive information used by law enforcement and related organizations;COP BOX;
CYBERPATH CyberPath Incorporated 29 North 700 East Orem UT 84057 computer software for secure electronic data interchange on or in connection with public and private computer networks;CYBER PATH;
CYBERPATH INCORPORATED CyberPath Incorporated 29 North 700 East Orem UT 84057 computer software for secure electronic data interchange on or in connection with public and private computer networks;CYBER PATH INCORPORATED;INCORPORATED;
DATA LOGISTICS Comunication Services International (CSI) s.r.l. galleria Spagna 28 35127 Padova Italy Computer software for secure electronic transmission of documents and messages over computer networks;Providing services for communications and secure document exchange over computer networks;
DATA LOGISTICS COMPANY Communication Services International (CSI) s.r.l. galleria Spagna 28 35127 Padova Italy Computer software for secure electronic transmission of documents and messages over computer networks;Secure electronic transmission of documents and messages over computer networks;
DATA LOGISTICS ENGINE Communication Services International (CSI) s.r.l. galleria Spagna 28 35127 Padova Italy computer software for secure electronic transmission of documents and messages over computer networks;
DELTAGUARD Deltaguard Incorporated 1011 East Murray-Holladay Road Murray UT 841174921 Computer software for secure electronic communication featuring authentication and encryption, user adjustable security levels, public keys, firewall facilitation and peer-to-peer vertical private networks; computer hardware for secure electronic communication, namely, facilitating speed and functionality of content exchange;
EXPRESSDX MidAmerican Energy Company 666 Grand Avenue, Ste. 500 666 Grand Avenue, Suite 500 Des Moines IA 50309 Computer software for secure electronic file delivery and receipt;EXPRESS DX;
PRIVATE EXPRESS PRIVATEEXPRESS, INC. 3190 CLEARVIEW WAY, SUITE 100 SAN MATEO CA 94402 Computer software for secure electronic messaging;EXPRESS;
TRUSTNODE INTERTRUST TECHNOLOGIES CORPORATION Suite 100 920 Stewart Drive Sunnyvale CA 94085 computer software for secure electronic event or transaction management;TRUST NODE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A secure software system for a portable device or computer that provides a simple interface to the device or computer and that retrieves and dynamically decrypts keys and content from a secure media while minimizing exposure of the keys and eliminating the need for manufacturers of the device or computer to create a their own system to manage these complex processes.