COMPUTER SOFTWARE USER AUTHENTICATION

Brand Owner (click to sort) Address Description
DIAMOND FORTRESS TELOS CORPORATION 19886 Ashburn Road Ashburn VA 20146 Computer software for user authentication; computer software for ensuring the security of electronic applications and data for mobile devices; computer software for collecting and storing human biometric information;
IDENTIGATE SecureD Services, Inc. 423 Denman Road Suite 100 Cranford NJ 07016 Computer Software for user authentication, authorization and account provisioning;IDENTIFY GATE;
IDENTIPRISE SecureD Services, Inc. 423 Denman Road Suite 100 Cranford NJ 07016 Computer Software for user authentication, authorization, account provisioning and single sign on;IDENTITY PRIZE;
INTELLIFY SecureD Services, Inc. 423 Denman Road Suite 100 Cranford NJ 07016 Computer Software for user authentication, authorization and account provisioning;INTELLIGENT IDENTIFY;
ONYX TELOS CORPORATION 19886 Ashburn Road Ashburn VA 20146 Computer software for user authentication; computer software for ensuring the security of electronic applications and data for mobile devices; computer software for collecting and storing human biometric information;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A technique to control access to computer network resources at a computer facility permits a user to interact with the computer facility through a computer node of a network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, and a user authentication process is performed to determine if the permitted user interaction is authorized. The user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user's language learning responses. In this way, user authentication occurs without intruding into the utilization of the computer facility.