DOWNLOADABLE MOBILE APPLICATION COMPUTER SOFTWARE

Brand Owner (click to sort) Address Description
GRIPT Enlait Tech, Inc. 4181 NW 1St Ave, Suite 6-1404 Boca Raton FL 33431 Downloadable mobile application computer software for providing guided tours of various touristic landmarks worldwide;
OKTA Okta, Inc. 100 First Street, 6th Floor San Francisco CA 94105 downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network;software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products;
OKTA CIC Okta, Inc. 100 First Street, 6th Floor San Francisco CA 94105 downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network;software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products;
OKTA CUSTOMER IDENTITY CLOUD Okta, Inc. 100 First Street, 6th Floor San Francisco CA 94105 downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network;software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products;
OKTA WIC Okta, Inc. 100 First Street, 6th Floor San Francisco CA 94105 downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network;software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products;
OKTA WORKFORCE IDENTITY CLOUD Okta, Inc. 100 First Street, 6th Floor San Francisco CA 94105 downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network;software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products;
RAPIDIDENTITY Identity Automation, LP 7102 N Sam Houston Pkwy W, Ste 100 Houston TX 77064 Downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology;RAPID IDENTITY;Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; providing user authentication services using single sign-on and multi-factor technology for online software applications;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for executing a rental software program in a distributed computing environment is provided. The system enables the streaming of software applications to the client computer. It also enables the system calls of the software application to be intercepted and analyzed in order to determine when one or more optional files are needed. The system also suspends the operation of the software application during retrieval of the optional files from the server so that the software application does not crash and then restarts the software application once the optional files are retrieved. The system also protects the software application and its optional files from unwanted copying in that the system may remove all of the files from the client computer once the rental of the software application has been completed. Finally, the system also enables a software vendor to easily and quickly upload a new software application to the server so that client computers may rent the software application.