DOWNLOADABLE COMPUTER SOFTWARE THAT FACILITATES

Brand Owner (click to sort) Address Description
CYPHER Figure Technologies, Inc. 650 California Street, Suite 2700 San Francisco CA 94108 Downloadable computer software that facilitates provision of financial services utilizing blockchain technology; downloadable cap table management software utilizing blockchain technology; downloadable financial instrument trading software utilizing blockchain technology; recorded computer software that facilitates provision of financial services utilizing blockchain technology; recorded cap table management software utilizing blockchain technology, recorded financial instrument trading software utilizing blockchain technology;Financial services for retail and institutional clients, including broker-dealer services, which utilize blockchain technology, in the field of mortgages, securities, stocks, bonds, mutual funds, and other tradable assets;Services to assist financial entities to operate using blockchain technology, namely, facilitating provision of financial services, managing cap tables, and trading financial instruments;Providing temporary use of non-downloadable computer software to facilitate provisioning of financial services utilizing blockchain technology, providing temporary use of non-downloadable computer software for cap table management utilizing blockchain technology, providing temporary use of non-downloadable software for financial instrument trading utilizing blockchain technology;
DAVINCI Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application;Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification Identity verification services, namely, providing validation of a person's verified identity;Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification;
EPSI Strata Decision Technology 200 E. RANDOLPH STREET 49TH FLOOR CHICAGO IL 60601 Downloadable computer software that facilitates budgeting, financial decision support, financial planning in the field of healthcare; Downloadable computer software that provides analytic solutions derived from real-time costs, and utilization data in the field of healthcare; Downloadable computer software that provides advanced predictive data analytics in areas including optimal consumption, and operations in the field of healthcare;
IAMOPS Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation; downloadable Software for multi-factor and strong authentication; downloadable Software for access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; downloadable Software for directory, identity provisioning and identity administration; downloadable Software for identity services auditing and reporting; downloadable Software for identity and access management services in the field of digital security and identity verification; downloadable Software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; downloadable security software for data, applications, and computer systems accessed via API or other programmatic methods; downloadable software for reporting programmatic interface traffic activity; downloadable software for reporting API traffic activity; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable computer software for analyzing attacker behavior within computer networks; downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; downloadable Computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; downloadable Software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; downloadable Software for implementing network packet brokers, intrusion prevention systems and network load balancers; downloadable Software for monitoring, analyzing or reporting of network information, data, and traffic;Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API); Computer security services, namely, restricting unauthorized access to computers, specifically by identity and access management services in the field of digital security and identity verification; Providing temporary use of on-line non-downloadable Software for API traffic security; Providing temporary use of on-line non-downloadable software for API activity monitoring and attack detection and reporting; Providing temporary use of on-line non-downloadable security software for data, applications, and computer systems accessed via API or other programmatic methods; Providing temporary use of on-line non-downloadable software for reporting programmatic interface traffic activity; Providing temporary use of on-line non-downloadable software for reporting API traffic activity; Providing temporary use of on-line non-downloadable software for computer network security; Providing temporary use of on-line non-downloadable software for cloud-based computer security; Providing temporary use of on-line non- downloadable software for monitoring computer networks; Providing temporary use of on-line non-downloadable software for detecting computer network intrusion; Providing temporary use of on-line non-downloadable software for monitoring and maintaining network security; Providing temporary use of on-line non-downloadable computer software for use in the safeguarding of network data or network services; Providing temporary use of on-line non-downloadable computer software for detecting security threat; Providing temporary use of on-line non-downloadable computer software for analyzing attacker behavior within computer networks; Providing temporary use of on-line non-downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; Providing temporary use of on-line non-downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; Providing temporary use of on-line non-downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; Providing temporary use of on-line non-downloadable software for securing API traffic across hybrid clouds; Providing temporary use of on-line non-downloadable software for protecting computers and network services from attack; Providing temporary use of on-line non-downloadable Computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; Providing temporary use of on-line non-downloadable Software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; Providing temporary use of on-line non- downloadable Software for implementing network packet brokers, intrusion prevention systems and network load balancers; Providing temporary use of on-line non-downloadable Software for monitoring, analyzing or reporting of network information, data, and traffic Identity verification services, namely, providing user authentication between two or more entities by using single sign-on technology for online software applications in the field of digital security Digital security services in the nature of administering digital certificates; identity management services in the nature of electronic monitoring of personally identifying information to detect false or fraudulent identity information via the internet;
IDENTIVERSE Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification;IDENTITY UNIVERSE;Software as a service (SAAS) services, namely, hosting nondownloadable computer software for use by others that facilitates identity federation in the field of digital security and identification;
LIBERATE JISC ONE CASTLEPARK, TOWER HILL BRISTOL BS2 0JA United Kingdom Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API); downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via API or other programmatic methods; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; computer software for the detection and removal of computer viruses and threats; computer software for managing and filtering electronic and wireless communications; computer software for protecting and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; anti-virus software; computer software for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; computer software for providing security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; computer software for tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; computer software for secure storage and management of usernames and passwords; computer hardware and software used to allow individuals to upload and download information, software, programs, media or documents from an online digital network, cloud network or server; computer hardware and software for publishing data to digital and cloud networks;Licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data;Computer security consultancy; computer security consulting services in the fields of information security, computer security, network security, cyber security, internet security, and data security; monitoring of computer systems for security purposes for the protection of information and data; computer security consulting services in the field of incident response to information, computer, network and internet security breaches; computer network security services and computer security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis, all of the foregoing for the protection of information and data; cybersecurity services, namely, penetration testing of computers and information systems and networks for vulnerability assessment and management, risk assessment in the nature of testing of information systems to determine vulnerability, data breach threat analysis, and network threat analysis, all of the foregoing for the protection of information and data; consulting in the field of computer security and electronic data security services, namely, providing cyber threat data intelligence collection and analysis services and solutions therefor; computer security services in the nature of providing an internet trust centre; computer security assurance; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; authentication, issuance and validation of digital certificates; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the internet;computer security services in the nature of detecting, reporting, investigating and resolving security incidents of network abuse and email abuse; computer security services in the nature of providing an internet trust centre, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; managed computer network and internet security services; computer security services in the nature of filtering content on the internet; software as a service namely, hosting non-downloadable computer software for use by others that scans networks and websites to detect and identify vulnerabilities and malware; online services, namely, providing internet-based and network-based computer virus protection services for others; security verification of computer network firewalls, servers and other network devices from unauthorized access; computer services, namely, detection of viruses and threats; Providing user authentication services using single sign-on technology for online software applications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification, Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates API traffic security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates API activity monitoring and attack detection and reporting; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates computer network security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates cloud-based computer security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates monitoring computer networks; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection of computer network intrusion; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for monitoring and maintaining network security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates safeguarding of network data or network services; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection of security threat; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the protection of computers and network services from attack; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the detection and removal of computer viruses and threats; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for managing and filtering electronic and wireless communications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the protection and securing the integrity of data computer networks, mobile devices, electronic and wireless communications and applications; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for creating and maintaining firewalls to prevent unauthorized access to and use of computer networks and systems; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates security for email, internal and other electronic communications, for identifying and blocking potentially dangerous or undesirable electronic communications and content, for identifying and blocking electronic communications from illegitimate sources, and for identifying and blocking computer and electronic mail viruses, spam, spyware, malware, and other undesirable content; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates tracking, locating, locking and wiping lost or stolen computers, tablets, mobile devices and other digital devices; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others for secure storage and management of usernames and passwords; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates the upload and download of information, software, programs, media or documents from an online digital network, cloud network or server; identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API);
LOGIN WITH ME Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document(s) and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security; Identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;
OG BUSINESS ONE GLOBAL SERVICE FOR GENERAL TRADING Awtad Tower, 8th Floor Fahd Al-Salim St Qibla, Kuwait City Kuwait Downloadable computer software that facilitates multiple types of payment and debt transactions; downloadable computer software, namely, electronic financial platform that accommodates multiple types of payment and debt transactions in an integrated mobile phone, PDA, and web based environment; downloadable computer software, namely, software for processing electronic payments and transferring funds to and from others; downloadable computer software for organizing, storing, providing access to, redeeming, scanning, sharing, and providing information about goods, services, discounts, tickets, boarding passes, coupons, consumer loyalty programs, and gift cards concerning a wide range of consumer products, services, and cultural, sporting and entertainment events; downloadable computer software for selling, downloading vouchers and tickets for admission to sporting, cultural and entertainment events; downloadable computer software for capturing, managing, and storing credit card and debit card information; downloadable computer software for use in connection with the electronic storage, transmission, presentation verification, authentication, and redemption of coupons; downloadable computer application software for mobile phones, tablets, mobile devices, namely, software for collecting credit card payment information, organizing credit, debit and loyalty card, special offer and coupon information into a mobile device wallet application and including a checkout application for presenting payment; downloadable computer software for use in payment processing and electronic invoicing; downloadable computer software for use in bill payment, invoice generation and transmission, money movement, financial management, cash flow monitoring, accounting, storing documents and viewing documents; downloadable computer software for merchants to track and manage their businesses, transactions, customers, and metrics in the fields of business and finance; downloadable computer software to allow users to perform electronic business transactions via a global computer network; downloadable computer software used to process mobile payments; downloadable computer software, namely, software for processing, facilitating, verifying, and authenticating mobile payments; downloadable computer software, namely, software for transmitting, processing, facilitating, verifying, and authenticating credit and debit card information and transaction and payment information; downloadable mobile applications for processing credit card payments, processing debit card payments, processing ACH e-check payments, creating and managing recurring payment schedules and payment plans, entering and managing orders, and managing customer accounts; downloadable computer application software for mobile phones, namely, software for use in point of sale retail and field service card-present credit card and debit card payment processing and key-entered one-time payment processing for credit cards, debit cards, and ACH debits to bank accounts; downloadable computer application software for mobile phones, and tablets, namely, software for use in point of sale, field service, and office environments for credit card, debit card, and ACH payment processing, creating and managing payment plan schedules, entering and managing orders, and managing customer accounts;ONE GLOBAL BUSINESS;Credit card verification; charge card, credit card and debits card services, namely, processing payments; providing electronic processing of credit card transactions and electronic payments via a global computer network; electronic payment, namely, electronic processing and transmission of bill payment data; credit card authorization services; credit card payment processing services; credit card transaction processing services; electronic credit card transactions processing; electronic debit transactions processing; electronic funds transfer; electronic transfer of money; financial transaction services, namely, providing secure commercial transactions and payment options; merchant services, namely, payment transaction processing services;BUSINESS;Application service provider (ASP) featuring software for use in payment processing and electronic invoicing; application service provider (ASP) featuring software for use in bill payment, invoice generation and transmission, money movement, financial management, cash flow monitoring, accounting, storing documents and viewing documents; application service provider featuring application programming interface (API) software for integrating ecommerce, business, transactional, financial, and analytics information and functionality into other software and platforms; providing temporary use of non-downloadable computer software for ecommerce merchants to track and manage their businesses, transactions, customers, and metrics in the fields of business and finance; providing temporary use of non-downloadable computer software for allowing users to perform electronic business transactions via a global computer network; providing temporary use of non-downloadable computer software for selling, buying and storing vouchers and tickets for admission to sporting, cultural and entertainment events; cloud computing featuring software for use in payment processing and electronic invoicing; computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of electronic invoicing and payment processing; computer services, namely, hosting an interactive web site that allows electronic invoicing and payment processing; providing a secure electronic online system featuring technology which allows vendors to submit electronic invoices to customers and sales representative agencies; providing a secure electronic online system featuring technology which allows electronic invoicing and payment processing; providing a web site featuring temporary use of non-downloadable software for electronic invoicing and payment processing; providing on-line non-downloadable software for electronic invoicing and payment processing; providing temporary use of non-downloadable computer software, namely, software for credit card, debit card, and ACH payment processing, creating and managing recurring payment and payment plan schedules, entering and managing orders, and managing customer accounts; software as a service (SAAS) services featuring software for payment processing and electronic invoicing; software as a service (SAAS) services, namely, hosting software for use by others for use in payment processing and electronic invoicing; providing temporary use of non-downloadable computer software for use in connection with the electronic storage, transmission, presentation verification, authentication, and redemption of coupons, rebates, discounts, incentives, and special offers;
ONE SECURE IDENTITY Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification;
PING DAVINCI Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application;Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification Identity verification services, namely, providing validation of a person's verified identity;Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification;
PING IDENTITY Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification;IDENTITY;Consulting services related to standards, processes and methods in the field of digital security and identity verification;
PING INTELLIGENT IDENTITY Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; downloadable computer software that facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; security software, being downloadable, for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; downloadable software for reporting API traffic activity; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable computer software for analyzing attacker behavior within computer networks; downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; downloadable software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; downloadable computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; downloadable software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; downloadable software for implementing network packet brokers, intrusion prevention systems and network load balancers; downloadable software for monitoring, analyzing or reporting of network information, data, and traffic;INTELLIGENT IDENTITY;Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API);
PINGAUTHORIZE Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application;PING AUTHORIZE;Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification; Identity verification services, namely, providing validation of a person's verified identity; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity;
PINGCENTRAL Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; downloadable security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable computer software for analyzing attacker behavior within computer networks; downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; downloadable computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; downloadable software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; downloadable software for implementing network packet;PING CENTRAL;
PINGCLOUD Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API), facilitates authorization policy services, facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification;PING CLOUD;Identity verification services, namely, providing user authentication between two or more entities in the field of digital security;Software as a service (SAAS) services, namely, hosting nondownloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API);
PINGCLOUD PRIVATE TENANT Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation, facilitates multi-factor and strong authentication, facilitates access control for web, mobile and application programmable interface (API), facilitates authorization policy services, facilitates directory, identity provisioning and identity administration services, facilitates identity services auditing and reporting, and facilitates other identity and access management services in the field of digital security and identity verification;PING CLOUD PRIVATE TENANT;Identity verification services, namely, providing user authentication between two or more entities in the field of digital security;PRIVATE TENANT;Software as a service (SAAS) services, namely, hosting nondownloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API);
PINGDATAGOVERNANCE Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification;PING DATA GOVERNANCE;
PINGDIRECTORY Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification;PING DIRECTORY;Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the nature of Security Assertion Markup Language (SAML), OpenID Connect (OIDC), OAuth, WS-Fed, WS-Trust, Lightweight Directory Access Protocol (LDAP), System for Cross-domain Identity Management (SCIM), Fast Identity Online (FIDO), Universal Authentication Framework (UAF), FIDO Universal 2nd Factor (U2F), Web Authentication (WebAuthn), Client-to-Authenticator Protocol (CTAP), Open Authentication (OATH) protocols for one-time password (OTP), time-based one-time password (TOTP), HMAC-based One-Time Password (HTOP), and Public Key Cryptography Standards (PKCS) in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API);
PINGID Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification;PING IDENTITY;
PINGID Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates multi-factor authentication and strong authentication in the field of digital security and identity verification;PING ID; PING IDENTIFICATION;Identity verification services, namely, providing user authentication between two or more entities in the field of digital security;Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates multi-factor authentication and strong authentication in the field of digital security and identification;
PINGINTELLIGENCE Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation; multi-factor and strong authentication; access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; directory, identity provisioning and identity administration services; identity services auditing and reporting; and other identity and access management services in the field of digital security and identity verification; Software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; software for protecting computers and network services from attack; Computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; Software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; Software for implementing network packet brokers, intrusion prevention systems and network load balancers; Software for monitoring, analyzing or reporting of network information, data, and traffic;PING INTELLIGENCE;
PINGONE Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification;PIN GONE;
PINGONE DAVINCI Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application;PING ONE DA VINCI;Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification Identity verification services, namely, providing validation of a person's verified identity;Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification;
REGISTER WITH ME Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document(s) and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security; Identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;
SHOCARD Ping Identity Corporation Suite 100 1001 17th Street Denver CO 80202 Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document(s) and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;SHOW CARD;Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security; Identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user;
SINGLETAP Digital Turbine, Inc. 110 San Antonio St. Austin TX 78701 downloadable computer software that facilitates the downloading and installation of additional computer software and applications onto computers and mobile devices;SINGLE TAP;advertising, marketing, and promotional services in order to facilitate the adoption by consumers of third party services and applications;computer services, namely, providing on-line non-downloadable software application that facilitates the downloading and installation of additional computer software and applications onto computers and mobile devices;
VERADIGM ALLSCRIPTS SOFTWARE 222 Merchandise Mart Plaza, Suite 2024 Chicago IL 60654 Downloadable computer software that facilitates healthcare data analysis and that supports optimal patient care management cost; downloadable computer software that provides health care providers with pricing and information relating to patient care plan options;Providing temporary use of non-downloadable cloud-based computer software in the field of healthcare, used by health care providers and administrative staff across patient care settings, that provides an integrated clinical repository featuring documentation, medication management, advanced clinical decision support, and physician order entry;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. One embodiment of the present invention provides a system that facilitates software installation using embedded user credentials. The system receives a software installation package at a computer to be installed on the computer. The system then extracts an installation program from the software installation package. Next, the system determines if the current user has sufficient privileges to run the installation program. If not, the system recovers a set of user credentials from the software installation package that is associated with sufficient privileges to run the installation program. The system then authenticates to the computer using this set of user credentials. Finally, the system runs the installation program on the computer.