WEB ROOT

Brand Owner Address Description
WEBROOT WEBROOT INC. 385 Interlocken Crescent, Suite 800 Broomfield CO 80021 WEB ROOT;Computer security services, namely, restricting access to and from undesired computers, networks and websites by and to computers, networks and mobile electronic devices; Computer services, namely, scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers, networks and mobile electronic devices; Computer virus, malware and spyware protection services; Computer security services, namely, scanning and testing of computers, networks and mobile electronic devices to assess information security vulnerability; Computer services, namely, providing information regarding risks and vulnerabilities for computers, networks and mobile electronic devices; Computer services, namely, providing online non-downloadable management and reporting tools for computers, networks and mobile electronic devices; Remote online backup of computer data; Technical support services, namely, troubleshooting of computer software and network problems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Systems and methods are described for distributing and updating trusted certification authorities to computer systems and users. When a digital certificate is encountered during a secured electronic transaction, the root authority of the certificate is determined. It is then determined whether the root authority is a trusted authority by attempting to locate the root authority in a trusted root list. If the root authority is not included in the trusted root list, a remote site is accessed and an updated version of the trusted root list is downloaded. The new trusted root list is checked for the presence of the encountered certificate and, if found, the transaction is allowed to proceed. In one implementation, the entire trusted root list is not downloaded. Instead, if an appropriate digital certificate is located, then the certificate is downloaded and added to the trusted root list of the computer system. The transaction may then proceed.