EQUIPMENT THAT PROVIDES USER AUTHENTICATION

Brand Owner (click to sort) Address Description
BLUE RIDGE Blue Ridge Networks, Inc. 14120 Parke Long Court #103 Chantilly VA 20151 Equipment that provides user authentication, network security, and information and data security in the fields of computer or telecommunications for others, namely, computer hardware; Computer software for user authentication, network security, and information and data security; Computer firmware for user authentication, network security, and information and data security; Computer hardware that provides user authentication, network security, and information and data security; Virtual private network hardware and operating software; Computer hardware, namely, cryptographic servers and proprietary privacy data software for remote and mobile users to have secure access to private networks;Managed services in the field of computer or telecommunications network security system for others, namely, computer consultation in the field of computer security, computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; and Computer consultation services in the field of design and implementation of computer hardware and software as part of a network security system for others;
BLUE RIDGE Blue Ridge Networks 103 14120 Parke Long Ct. Chantilly VA 20151 Equipment that provides user authentication, network security, and information and data security in the fields of computer or telecommunications for others, namely, computer hardware; Computer software for user authentication, network security, and information and data security; Computer firmware for user authentication, network security, and information and data security; Computer hardware that provides user authentication, network security, and information and data security; Virtual private network hardware and operating software; Computer hardware, namely, cryptographic servers and proprietary privacy data software for remote and mobile users to have secure access to private networks;Managed services in the field of computer or telecommunications network security system for others, namely, computer consultation in the field of computer security, computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; and Computer consultation services in the field of design and implementation of computer hardware and software as part of a network security system for others;
SECURE. EASY. PROTECTED. ACCESS. Blue Ridge Networks, Inc. 14120 Parke Long Court #103 Chantilly VA 20151 Equipment that provides user authentication, network security, and information and data security in the fields of computer or telecommunications for others, namely, computer hardware; Computer software for user authentication, network security, and information and data security; Computer firmware for user authentication, network security, and information and data security; Computer hardware that provides user authentication, network security, and information and data security; Virtual private network hardware and operating software; Computer hardware, namely, cryptographic servers and proprietary privacy data software for remote and mobile users to have secure access to private networks; Software to prevent and eliminate malware, viruses, worms, trojans, spyware, intrusive software and code, and adware;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for executing personal authentication processing by communication through a human body, in which authentication corresponding to a service to be furnished can be executed efficiently. The authentication processing between a portable equipment worn by a user and a service furnishing terminal is executed by a human body touching a contact point of the service furnishing terminal. The processing occurs with a real physical feeling of user contact. A user-native identifier and a user-variable identifier generated from user to user depending on the service presented by a service terminal are stored in a user equipment. Responsive to the service identifier transmitted from the service terminal, service-native user identification data, derived at least from the user variable identifier, is generated in the portable equipment and forwarded to the service terminal. A variety of user management operations, such as user-based assessment operations, depending on service contents, are carried out.