SECURE RF

Brand Owner (click to sort) Address Description
SECURERF SecureRF 175 Post Road West Westport CT 06880 SECURE RF;secure electronic document, or other physical device providing identification data of materials, goods, files, or persons, using RFID and/or Smart Card technology, to carry descriptive data and/or identify, and/or count, and/or locate, and/or determine movement, and/or expiration dates, and/or control data, and/or manufacturing data, and/or security levels of same, thereby providing for the accessing of associative databases locally, or via LAN's, WAN's, the internet, or other networks, and the display or use of all related information pertaining thereto;
SECURERF SecureRF Corporation 100 Beard Sawmill Road Shelton CT 06484 SECURE RF;Business management services featuring software and other technology solutions for purposes of securing and authenticating information at rest and in transit, including identification information, location information, on products as well as protecting products against counterfeiting and providing branding monitoring, including identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting;Programming of computer software for others; customized software development in the fields of securing and authenticating information at rest and in transit, including identification information, location information, on products, and protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting; Installation, maintenance, and implementation of computer software for purposes of securing and authenticating information at rest and in transit, including identification information, location information, on products, and protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting; Implementation of computer technologies for others for purposes of securing and authenticating information at rest and in transit, including identification information, location information, on products, and protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting; Computer systems integration services for purposes of protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and system for sending, receiving and managing the exchange of messages between an intranet and multiple external users using a secure server as an intermediary interface for Internet communications. In one form, the secure server operates in a replication mode with a Lotus Domino server wherein secure transmissions are designated by an @secure URL. In another form, secure transmissions are implemented by establishing a secure connection to the secure server using a browser addressing the server URL. The server operating system interfaces with the intranet so that the intranet user can use standard groupware, such as Lotus Notes, to create, send and receive secure documents. External users are notified by normal e-mail of the presence of secure documents at the server and must connect to the server in a secure mode to retrieve documents. Responses to documents are automatically returned to the sender's e-mail server using secure transmission.