DOWNLOADABLE COMPUTER SOFTWARE AUTHENTICATING

Brand Owner (click to sort) Address Description
ALTERNATIVES TO DETENTION T Stamp Inc. 3017 Bolling Way NE, 1st and 2nd Floors Atlanta GA 30305 Downloadable computer software for authenticating user location; downloadable computer software for authenticating user location via geolocation data and biometric facial verification; downloadable computer software in the nature of a mobile application for authenticating user location featuring secure facial verification, passive geolocation capture, custom geofence capabilities, and preset, random, and on-demand location validation detection;
CHEQD CHEQD FOUNDATION LIMITED The Commerze@Irving, 1 Irving Place, #08-11 Singapore 369456 Singapore Downloadable computer software for authenticating user identification; software, application software, computer programmes, and computer software for use as an api, all for the provision of identity verification; software and systems for the analysis of business data and to enable retrieval of data; software and systems for the collection, organisation, storage and sharing of data and information; computer programmes for accessing, browsing and searching online databases and the internet; computer software and systems to enable the recording of verified identifiers on a public data registry; software to facilitate identity validation; software to create and administer a decentralised governance ecosystem; software to facilitate the payment in return for verified identities of users, companies, or objects; cryptography software for identity validation and verification; software to reward participants of a decentralised network; software to create and manage digital identity cards with trusted information; downloadable computer software for digital payment technology;Providing user access to a global, decentralised computer network; providing user access to computer programs in data networks for governance consensus, voting and updates; providing multiple-user access to a global, decentralised computer network; providing on-line forums for transmission of messages among computer users for governance proposals and updates;Digital currency hardware wallets; digital currency exchange services; providing a reward scheme including issuance of digital currency; maintaining a payment service for the exchange of verified identity credentials; custodian management services for digital currency; maintaining escrow services for digital currency; decentralized finance transaction services, by creating the default settings for a blockchain network and the initial governance framework; providing incentive schemes including the issuance of digital currency;Electronic data collection and data sharing services for business purposes in the fields of authenticating user identification; computerised data processing and verification in relation to a variety of background checks including without limitation know your customer (kyc) checks; computerised data processing and verification through cryptographic resolution of verified identity data; providing electronic data processing related to identity verification information, advisory and consultancy services relating to all the aforesaid;Providing temporary use of non-downloadable computer software for authenticating user identification; electronic storage of information and data; electronic identity verification services; research and information services in the field of identity verification; designing computer software, application software and apis in relation to identity verification; software enabled services allowing users to store information from different applications into a centralised folder; software enabled services allowing users to store information from different applications into a secure storage; software enabled services enabling the revocation of identity data from data storage; software enabled services for the management of cryptographic keys; software enabled services allowing users to carry out identity verification;
CONFIRMWIRE Paul G. Lewis 120 Apgar Way Asbury NJ 08802 Downloadable computer software for authenticating the identity of parties to a wire transaction; downloadable computer software for authenticating user identification; downloadable mobile application software in the nature of computer application software for mobile phones for authenticating user identification;CONFIRM WIRE;Financial transaction authentication services, namely, providing secure commercial transactions and payment verification options;Providing online non-downloadable software for authenticating the identity of parties to a wire transaction; computer security services in the nature of providing user authentication services using biometric hardware and software technology for secure identity verification; providing user authentication services using multi-factor identification for financial transactions; financial transaction authentication services, namely, providing user authentication services using biometric hardware and software technology for secure identity verification;
FLEXOGRAPH Sequoia Games Inc. Suite 107-173 18340 Yorba Linda Boulevard Yorba Linda CA 92886 Downloadable computer software for authenticating autographs using blockchain technology; Downloadable computer software for creating, managing, and validating registries authenticating autographs and related transactions using blockchain technology;User authentication services using blockchain technology for transactions involving autographs and related collectibles; Authentication of data in the field of autographs and collectibles using blockchain technology; Providing user authentication services using blockchain-based software technology for autographs and collectibles;
HGTAG Packaging Innovation, S. De R.L. 1st St, El Carmen. Edificio Centro Empresarial Mar del Sur Piso 4 Suite 412 Panama-Republica Panama Downloadable computer software for authenticating products; Downloadable computer software for customer relationship management; Downloadable computer software for providing augmented reality services using scanning software technology; Downloadable computer software for providing customer data collection, analysis and management; Downloadable computer software for providing logistics management and tracking;HG TAG;Software as a service (SAAS) services featuring software for authenticating products; Software as a service (SAAS) services featuring software for customer relationship management; Software as a service (SAAS) services featuring software for providing augmented reality services using scanning software technology; Software as a service (SAAS) services featuring software for providing customer data collection, analysis and management; Software as a service (SAAS) services featuring software for providing logistics management and tracking; Providing product authentication services using scanning software technology; Providing customer relationship management services using scanning software technology; Providing augmented reality services using scanning software technology; Providing customer data collection, analysis and management; Providing logistics management and tracking;
SYFEREX Syferex 10236 Orchid Reserve Dr. West Palm Beach FL 33412 DOWNLOADABLE COMPUTER SOFTWARE FOR AUTHENTICATING USER IDENTIFICATION; WIRELESS COMMUNICATION SYSTEM COMPRISED OF CERTIFICATION AUTHORITY SERVER AND A BODY MOUNTED DEVICE, NAMELY, WATCH, BAND, BRACELET, RING, PATCH, CARD OR THE LIKE AND A HANDHELD WIRELESS DEVICE USED TO FACILITATE SECURE ENCRYPTED COMMUNICATION;
SYFEREX Syferex 10236 Orchid Reserve Dr. West Palm Beach FL 33412 Downloadable computer software for authenticating user identification; wireless communication system comprised of certification authority server and a handheld wireless device used to facilitate secure encrypted communication in the nature of an electronic encryption unit, and also including a body mounted device, namely, smartwatch, encoded magnetic identification wrist band, smart bracelet, smart ring, RFID patch and magnetic identifying card all sold as a unit;
VINTELA One Identity 4 Polaris Way Aliso Viejo CA 92656 Downloadable computer software for authenticating user identification; Downloadable computer software for analyzing computer user behavior; downloadable software for controlling access privileges of users of computer systems and applications; downloadable computer software in the field of identity intelligence and user behavior analytics; downloadable software for identifying and authenticating users and establishing and managing user identity credentials; Downloadable computer software for enabling identity, access and privilege management across multiple operating systems; Downloadable computer software for managing user identity credentials; Downloadable computer software for analysis of user behavior for security and access purposes; computer hardware; security token hardware to provide token-based authentication; Downloadable computer software for auditing, managing, and optimizing digital security; Downloadable computer software for identity and access management, for use in controlling access or access privileges of users of computer systems and applications;Software as a service (SAAS) featuring software for data analysis, user identity and user access management in the field of identity intelligence and user and risk behavior analytics; software as a service (SAAS) featuring software for data analysis, user identity and user access management in the field of identity access management and digital security; software as a service (SAAS) featuring software for identity and access management, for use in controlling access or access privileges of users of computer systems and applications; software as a service (SAAS) featuring software for identity, privilege, and access management; software as a service (SAAS) featuring software for monitoring, measuring and analyzing security; providing use of non-downloadable, cloud-based software for data analysis, user identity and user access management in the field of identity and access management; providing use of non-downloadable, cloud-based software for identity and access management for use in controlling access privileges of users of computer systems; providing use of non-downloadable, cloud-based software, namely, identity and access management software; computer services, namely, integration of identity and access management software and protocols across existing infrastructure and applications; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer security consultancy; IT consulting services; identity and access management consulting services, namely, consulting in the field of computer user identity and managing access to computer systems and networks; computer consultation services in the field of computer user identity and user access management; research in the field of computer intelligence and security technology; computer software installation and maintenance; computer software development in the field of identity intelligence and user behavior analytics;
ZERO TRUST EDGE ERICOM SOFTWARE LTD. Har Hotzvim, Technology Park 12 Hartom Street, POB 45122 Jerusalem 9777512 Israel Downloadable computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;Cloud computing featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; Software as a Service (SaaS) services featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior;
ZKX Redcom Laboratories, Inc. One Redcom Center Victor NY 14564 Downloadable computer software for authenticating user identification;Providing temporary use of non-downloadable computer software for authenticating user identification;
ZTEDGE ERICOM SOFTWARE LTD. Har Hotzvim, Technology Park 12 Hartom Street, POB 45122 Jerusalem 9777512 Israel Downloadable computer software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, detection and alerting on anomalous user behavior;ZT EDGE;Cloud computing featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior; Software as a Service (SaaS) services featuring software for authenticating users and endpoint devices and securely connecting them to software applications and the web and Internet, enforcing acceptable use policies and permission-based access policies, protecting computer systems, networks, data, and software from viruses, malware, and web-based threats, segmentation of network connected systems and applications, monitoring and auditing network traffic and computer system access, and detection and alerting on anomalous user behavior;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. There is disclosed an apparatus for controlling a physical layer interface of a network interface card. The apparatus comprises: 1) a read only memory (ROM) for storing an embedded control program; 2) a random access memory for storing a downloadable software control program; and 3) a microcontroller for controlling the physical layer interface, wherein the microcontroller in a first operating mode executes the embedded control program to thereby control the physical layer interface, and wherein the microcontroller in a second operating mode downloads the downloadable software control program from an external processing system and executes the software control program in place of the embedded control program to thereby control the physical layer interface.