Brands and Their Owners
Welcome to the Brand page for “IDENTIFENCE”, which is offered here for Downloadable or recorded computer programs and computer software for database management in the field of human biometric data; downloadable or recorded cloud computing software application platforms for detecting and restricting unauthorized access or data breach of computer systems; downloadable cloud computing software for deploying virtual machines to a cloud computing platform and managing virtual machines on a cloud computing platform; downloadable or recorded computer software for encryption, decryption, authentication and verification of data, information and messages; biometric identification systems comprised of biometric identification apparatus and computer hardware for biometric identification; downloadable or recorded computer software for identifying persons based on information and data from a biometric verification, identification, and security software system; downloadable or recorded software for accessing, controlling, and operating electronic fingerprint readers and fingerprint imagers; downloadable or recorded software for document authentication and identity verification; downloadable or recorded software and firmware for authenticating user identification using one or more identity biometric characteristics for the purposes of authenticating documents, and verifying data; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;printed matter, brochures, manuals, periodicals, magazines, columns, written articles, informational flyers, pamphlets, booklets, and reports in the field of cybersecurity; publicity literature, printed advertising pamphlets; catalogues in the field of cybersecurity computer hardware and software;computerized data processing; computerized database managements; business consultation services; online media monitoring services using computer software to automatically monitor internet websites and online publications for customer-specified topics and to capture relevant content on those topics, and providing documentation and analysis of that online content to others for business purposes; providing business information directory services, via a global computer network; collection and systematisation of information into computer databases; providing business information, commercial corporate and statistical information provided on-line from a computer database or the internet;computer programming and computer software design; development of computer platforms; software as a service (saas) services featuring cloud computing identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; software as a service (saas) services, hosting software for use by others to securely enroll, verify, issue, authenticate and manage personal and digital identities; design, development, installation, repair, and maintenance of computer software used for identifying and authenticating data, documents, and personal identity; computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned verified personal identification credentials; providing online non-downloadable cloud computing software application platforms for detecting and restricting unauthorized access or data breach of computer systems; providing online non-downloadable computer software for encryption, decryption, authentication and verification of data, information and messages; providing online non-downloadable software for accessing, controlling, and operating electronic fingerprint readers and fingerprint imagers; providing online non-downloadable software for identifying persons based on information and data from a biometric verification, identification, and security software system; providing online non-downloadable software for document authentication and identity verification; providing online non-downloadable software and firmware for authenticating user identification using one or more identity biometric characteristics for the purposes of authenticating documents and verifying data;.
Its status is currently believed to be active. Its class is unavailable. “IDENTIFENCE” is believed to be currently owned by “TATA CONSULTANCY SERVICES LIMITED”.
Owner: |
TATA CONSULTANCY SERVICES LIMITED
Owner Details |
---|---|
Description: |
Downloadable or recorded computer programs and computer software for database management in the field of human biometric data; downloadable or recorded cloud computing software application platforms for detecting and restricting unauthorized access or data breach of computer systems; downloadable cloud computing software for deploying virtual machines to a cloud computing platform and managing virtual machines on a cloud computing platform; downloadable or recorded computer software for encryption, decryption, authentication and verification of data, information and messages; biometric identification systems comprised of biometric identification apparatus and computer hardware for biometric identification; downloadable or recorded computer software for identifying persons based on information and data from a biometric verification, identification, and security software system; downloadable or recorded software for accessing, controlling, and operating electronic fingerprint readers and fingerprint imagers; downloadable or recorded software for document authentication and identity verification; downloadable or recorded software and firmware for authenticating user identification using one or more identity biometric characteristics for the purposes of authenticating documents, and verifying data; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;Printed matter, brochures, manuals, periodicals, magazines, columns, written articles, informational flyers, pamphlets, booklets, and reports in the field of cybersecurity; publicity literature, printed advertising pamphlets; catalogues in the field of cybersecurity computer hardware and software;Computerized data processing; computerized database managements; business consultation services; online media monitoring services using computer software to automatically monitor internet websites and online publications for customer-specified topics and to capture relevant content on those topics, and providing documentation and analysis of that online content to others for business purposes; providing business information directory services, via a global computer network; collection and systematisation of information into computer databases; providing business information, commercial corporate and statistical information provided on-line from a computer database or the internet;Computer programming and computer software design; development of computer platforms; software as a service (SAAS) services featuring cloud computing identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; software as a service (SAAS) services, hosting software for use by others to securely enroll, verify, issue, authenticate and manage personal and digital identities; design, development, installation, repair, and maintenance of computer software used for identifying and authenticating data, documents, and personal identity; computer security services, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned verified personal identification credentials; providing online non-downloadable cloud computing software application platforms for detecting and restricting unauthorized access or data breach of computer systems; providing online non-downloadable computer software for encryption, decryption, authentication and verification of data, information and messages; providing online non-downloadable software for accessing, controlling, and operating electronic fingerprint readers and fingerprint imagers; providing online non-downloadable software for identifying persons based on information and data from a biometric verification, identification, and security software system; providing online non-downloadable software for document authentication and identity verification; providing online non-downloadable software and firmware for authenticating user identification using one or more identity biometric characteristics for the purposes of authenticating documents and verifying data;
|
Categories: | DOWNLOADABLE OR RECORDED COMPUTER PROGRAMS |