DOWNLOADABLE SOFTWARE ZERO TRUST

Brand Owner Address Description
SELECTIVETRUST KnectIQ Inc. Suite 1 724 Bielenberg Dr. Woodbury MN 55125 Downloadable software for zero trust network, endpoint, hardware, and device access; downloadable software for data security and endpoint authentication; downloadable software for user authentication, validation, and authorization;SELECTIVE TRUST;Providing online non-downloadable software for zero trust network, endpoint, hardware, and device access; providing online non-downloadable software for data security and endpoint authentication; providing online non-downloadable software for user authentication, validation, and authorization; Infrastructure as a service (IAAS) services, namely, hosting software for zero trust network, endpoint, hardware, and device access; Infrastructure as a service (IAAS) services, namely, hosting software for data security and endpoint authentication; Infrastructure as a service (IAAS) services, namely, hosting software for user authentication, validation, and authorization; Software as a service (SAAS) services, featuring software for zero trust network, endpoint, hardware, and device access; Software as a service (SAAS) services, featuring software for data security and endpoint authentication; Software as a service (SAAS) services, featuring software for user authentication, validation, and authorization; Design, development, and customization of computer software; Technology consultation in the field of cybersecurity; Cybersecurity services in the nature of restricting unauthorized access to computer systems, networks, hardware and devices;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention relates to establishing security within an ad hoc network. Such ad hoc networks do not have on-line connections to a particular server for getting desired public keys or certificates, thereby requiring them to create trust relations among their respective nodes wherein some of the nodes have a mutual trust relation to each other, thus constituting a trust group. When a particular candidate node desires to join the trust group, an X-node is identified, being a member of a trust group and having a trust relation with the candidate node. The X-node then certifies the candidate node and establishes and distributes trust relations between the members of the trust group and the candidate node.