Brands and Their Owners
Brand | Owner (click to sort) | Address | Description |
---|---|---|---|
ALTERNATIVES TO DETENTION | T Stamp Inc. | 3017 Bolling Way NE, 1st and 2nd Floors Atlanta GA 30305 | Downloadable computer software for authenticating user location; downloadable computer software for authenticating user location via geolocation data and biometric facial verification; downloadable computer software in the nature of a mobile application for authenticating user location featuring secure facial verification, passive geolocation capture, custom geofence capabilities, and preset, random, and on-demand location validation detection; |
CHEQD | CHEQD FOUNDATION LIMITED | The Commerze@Irving, 1 Irving Place, #08-11 Singapore 369456 Singapore | Downloadable computer software for authenticating user identification; software, application software, computer programmes, and computer software for use as an api, all for the provision of identity verification; software and systems for the analysis of business data and to enable retrieval of data; software and systems for the collection, organisation, storage and sharing of data and information; computer programmes for accessing, browsing and searching online databases and the internet; computer software and systems to enable the recording of verified identifiers on a public data registry; software to facilitate identity validation; software to create and administer a decentralised governance ecosystem; software to facilitate the payment in return for verified identities of users, companies, or objects; cryptography software for identity validation and verification; software to reward participants of a decentralised network; software to create and manage digital identity cards with trusted information; downloadable computer software for digital payment technology;Providing user access to a global, decentralised computer network; providing user access to computer programs in data networks for governance consensus, voting and updates; providing multiple-user access to a global, decentralised computer network; providing on-line forums for transmission of messages among computer users for governance proposals and updates;Digital currency hardware wallets; digital currency exchange services; providing a reward scheme including issuance of digital currency; maintaining a payment service for the exchange of verified identity credentials; custodian management services for digital currency; maintaining escrow services for digital currency; decentralized finance transaction services, by creating the default settings for a blockchain network and the initial governance framework; providing incentive schemes including the issuance of digital currency;Electronic data collection and data sharing services for business purposes in the fields of authenticating user identification; computerised data processing and verification in relation to a variety of background checks including without limitation know your customer (kyc) checks; computerised data processing and verification through cryptographic resolution of verified identity data; providing electronic data processing related to identity verification information, advisory and consultancy services relating to all the aforesaid;Providing temporary use of non-downloadable computer software for authenticating user identification; electronic storage of information and data; electronic identity verification services; research and information services in the field of identity verification; designing computer software, application software and apis in relation to identity verification; software enabled services allowing users to store information from different applications into a centralised folder; software enabled services allowing users to store information from different applications into a secure storage; software enabled services enabling the revocation of identity data from data storage; software enabled services for the management of cryptographic keys; software enabled services allowing users to carry out identity verification; |
CONFIRMWIRE | Paul G. Lewis | 120 Apgar Way Asbury NJ 08802 | Downloadable computer software for authenticating the identity of parties to a wire transaction; downloadable computer software for authenticating user identification; downloadable mobile application software in the nature of computer application software for mobile phones for authenticating user identification;CONFIRM WIRE;Financial transaction authentication services, namely, providing secure commercial transactions and payment verification options;Providing online non-downloadable software for authenticating the identity of parties to a wire transaction; computer security services in the nature of providing user authentication services using biometric hardware and software technology for secure identity verification; providing user authentication services using multi-factor identification for financial transactions; financial transaction authentication services, namely, providing user authentication services using biometric hardware and software technology for secure identity verification; |
FLEXOGRAPH | Sequoia Games Inc. | Suite 107-173 18340 Yorba Linda Boulevard Yorba Linda CA 92886 | Downloadable computer software for authenticating autographs using blockchain technology; Downloadable computer software for creating, managing, and validating registries authenticating autographs and related transactions using blockchain technology;User authentication services using blockchain technology for transactions involving autographs and related collectibles; Authentication of data in the field of autographs and collectibles using blockchain technology; Providing user authentication services using blockchain-based software technology for autographs and collectibles; |
HGTAG | Packaging Innovation, S. De R.L. | 1st St, El Carmen. Edificio Centro Empresarial Mar del Sur Piso 4 Suite 412 Panama-Republica Panama | Downloadable computer software for authenticating products; Downloadable computer software for customer relationship management; Downloadable computer software for providing augmented reality services using scanning software technology; Downloadable computer software for providing customer data collection, analysis and management; Downloadable computer software for providing logistics management and tracking;HG TAG;Software as a service (SAAS) services featuring software for authenticating products; Software as a service (SAAS) services featuring software for customer relationship management; Software as a service (SAAS) services featuring software for providing augmented reality services using scanning software technology; Software as a service (SAAS) services featuring software for providing customer data collection, analysis and management; Software as a service (SAAS) services featuring software for providing logistics management and tracking; Providing product authentication services using scanning software technology; Providing customer relationship management services using scanning software technology; Providing augmented reality services using scanning software technology; Providing customer data collection, analysis and management; Providing logistics management and tracking; |
|
|||
SYFEREX | Syferex | 10236 Orchid Reserve Dr. West Palm Beach FL 33412 | DOWNLOADABLE COMPUTER SOFTWARE FOR AUTHENTICATING USER IDENTIFICATION; WIRELESS COMMUNICATION SYSTEM COMPRISED OF CERTIFICATION AUTHORITY SERVER AND A BODY MOUNTED DEVICE, NAMELY, WATCH, BAND, BRACELET, RING, PATCH, CARD OR THE LIKE AND A HANDHELD WIRELESS DEVICE USED TO FACILITATE SECURE ENCRYPTED COMMUNICATION; |
SYFEREX | Syferex | 10236 Orchid Reserve Dr. West Palm Beach FL 33412 | Downloadable computer software for authenticating user identification; wireless communication system comprised of certification authority server and a handheld wireless device used to facilitate secure encrypted communication in the nature of an electronic encryption unit, and also including a body mounted device, namely, smartwatch, encoded magnetic identification wrist band, smart bracelet, smart ring, RFID patch and magnetic identifying card all sold as a unit; |
VINTELA | One Identity | 4 Polaris Way Aliso Viejo CA 92656 | Downloadable computer software for authenticating user identification; Downloadable computer software for analyzing computer user behavior; downloadable software for controlling access privileges of users of computer systems and applications; downloadable computer software in the field of identity intelligence and user behavior analytics; downloadable software for identifying and authenticating users and establishing and managing user identity credentials; Downloadable computer software for enabling identity, access and privilege management across multiple operating systems; Downloadable computer software for managing user identity credentials; Downloadable computer software for analysis of user behavior for security and access purposes; computer hardware; security token hardware to provide token-based authentication; Downloadable computer software for auditing, managing, and optimizing digital security; Downloadable computer software for identity and access management, for use in controlling access or access privileges of users of computer systems and applications;Software as a service (SAAS) featuring software for data analysis, user identity and user access management in the field of identity intelligence and user and risk behavior analytics; software as a service (SAAS) featuring software for data analysis, user identity and user access management in the field of identity access management and digital security; software as a service (SAAS) featuring software for identity and access management, for use in controlling access or access privileges of users of computer systems and applications; software as a service (SAAS) featuring software for identity, privilege, and access management; software as a service (SAAS) featuring software for monitoring, measuring and analyzing security; providing use of non-downloadable, cloud-based software for data analysis, user identity and user access management in the field of identity and access management; providing use of non-downloadable, cloud-based software for identity and access management for use in controlling access privileges of users of computer systems; providing use of non-downloadable, cloud-based software, namely, identity and access management software; computer services, namely, integration of identity and access management software and protocols across existing infrastructure and applications; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; IT consulting services; identity and access management consulting services, namely, consulting in the field of computer user identity and managing access to computer systems and networks; computer consultation services in the field of computer user identity and user access management; research in the field of computer intelligence and security technology; computer software installation and maintenance; computer software development in the field of identity intelligence and user behavior analytics; |
ZERO TRUST EDGE | ERICOM SOFTWARE LTD. | Har Hotzvim, Technology Park 12 Hartom Street, POB 45122 Jerusalem 9777512 Israel | Downloadable computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;Cloud computing featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; Software as a Service (SaaS) services featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; |
ZKX | Redcom Laboratories, Inc. | One Redcom Center Victor NY 14564 | Downloadable computer software for authenticating user identification;Providing temporary use of non-downloadable computer software for authenticating user identification; |
ZTEDGE | ERICOM SOFTWARE LTD. | Har Hotzvim, Technology Park 12 Hartom Street, POB 45122 Jerusalem 9777512 Israel | Downloadable computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;ZT EDGE;Cloud computing featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; Software as a Service (SaaS) services featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; |
Where the owner name is not linked, that owner no longer owns the brand |