ONLINE GIFT REGISTRY SERVICES

Brand Owner (click to sort) Address Description
GEEZEIT Geezeit 3145 Geary Blvd., #744 San Francisco CA 94118 Online gift registry services;
GIVING SPREE GROUP PUBLISHING, INC. 1515 Cascade Avenue Loveland CO 80538 ONLINE GIFT REGISTRY SERVICES FOR INDIVIDUALS TO PROVIDE CHARITABLE DONATIONS AND TO PURCHASE RELIGIOUS EDUCATIONAL PRODUCTS FOR CHURCHES AND OTHER CHRISTIAN EDUCATIONAL INSTITUTIONS;GIVING;
LULLABY CLUB TARGET BRANDS, INC. 1000 Nicollet Mall Minneapolis MN 55403 Online gift registry services;
OODLES Davis, Beverly R. Suite K313 3001 Bridgeway Avenue Sausalito CA 94965 Online gift registry services;
OODLES Polk, Maria E. Suite K313 3001 Bridgeway Avenue Sausalito CA 94965 Online gift registry services;
RAPID REGISTRY WEDDINGCHANNEL.COM, INC. 888 South Figueroa Street Suite 700 Los Angeles CA 90017 ONLINE GIFT REGISTRY SERVICES;REGISTRY;PROVIDING INFORMATION IN THE FIELD OF WEDDING PLANNING VIA THE INTERNET;
THE GIFT CARD REGISTRY Kinoli, Inc. 8010 South County Road 5, Suite 204 Windsor CO 80528 Online gift registry services for all occasions enabling registering users to select gift cards from a wide variety of businesses and enabling others to contribute to balances available on the selected gift cards;
THE PERFECT GIFT Myperfectgift.com Suite 205 1436 Second St NAPA CA 94558 Online gift registry services;GIFT;
WELL WISHES Well Wishes, Inc. 9850 VON ALMEN COURT SUITE 201 LOUISVILLE KY 40241 Online gift registry services;
WELL WISHES Well Wishes 1700 Meadowgate Lane Louisville KY 40223 Online gift registry services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and apparatus for authenticating a Windows® system registry comprising generating and storing a user identity value. The user identity value is generated by inserting a user identity in a one way function. The technique also generates and stores a registry security value corresponding with the system registry. In one embodiment, the registry security value is obtained by concatenating system registry information, for example, system registry files or system registry handle keys, and inserting the concatenated system registry information in a one way function to obtain the registry security value. An application program authenticates the registry information before using the registry information. Alternately, the registry is monitored and a change to the registry is permitted if a user identity value is equal to the stored user identity value.