COMPUTER SOFTWARE ENCRYPTION

Brand Owner (click to sort) Address Description
1 CLICK ENCRYPT SecurenCrypt 7333 Matthews Rd. Spring Arbor MI 49283 Computer software for encryption;ENCRYPT;
7TUNNELS 7Tunnels P. O. Box 982470 Park City UT 84098 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;SEVEN TUNNELS;Data encryption and decoding services; Data encryption services;
ACCESSKEY ACCESSKEY IP, INC. 8100 M-4 WYOMING NE SUITE 420 ALBUQUERQUE NM 87113 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; USB (universal serial bus) hardware;ACCESS KEY;Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates;
ACCESSKEY VAULT AccessKey Vault 8100 M4 Wyoming Blve. NE Suite 420 Albuquerque NM 87113 Computer software for encryption;ACCESS KEY VAULT;
ALACRITY Dan Kaminsky Holdings 40 E. Division Street, Suite A Dover DE 19901 Computer software for encryption, decryption, and data authentication; computer software for assessing, reporting, and preventing security risks and privacy risks on electronic devices; computer and electronic device anti-virus software; internet security software, namely, software to prevent security intrusion, phishing, spyware, malware, and security threats; computer software for authenticating the validity and security of domain name system (DNS) technologies built on Domain Name System Security Extensions (DNSSEC);Providing on-line non-downloadable computer software for encryption, decryption, and data authentication; providing on-line non-downloadable computer software for assessing, reporting, and preventing security risks and privacy risks on electronic devices; providing on-line non-downloadable computer and electronic device anti-virus software; providing on-line non-downloadable internet security software, namely, software to prevent security intrusion, phishing, spyware, malware, and security threats; providing on-line, non-downloadable software for authenticating the validity and security of domain name system (DNS) technologies built on Domain Name System Security Extensions (DNSSEC); computer security consulting services in the field computer and network testing and analysis to assess information and network security vulnerability;
ANA AUTOMATED NETWORK ADMINISTRATOR ARTEC Computer GmbH ROBERT-BOSCH-STR 38 61184 KARBEN Germany Computer software for encryption; Software for ensuring the security of electronic mail; Computer database management software for use in personalizing the content of e-mail communications; Computer anti-virus software; Anti-spyware software; Computer software for use in the safeguarding of digital files, namely, audio, video, text, binary, still images, graphics and multimedia files;AUTOMATED NETWORK ADMINISTRATOR;Computer security systems analysis; Computer security consultancy; Computer security service, namely, restricting access to undesired web sites, media and individuals and facilities;
ANGRYMINER MULTIMINER LIMITED 5 floor, apt. 17 Achaion 35 Nicosia 1101 Cyprus Computer software for encryption; Computer software for managing and validating cryptocurrency transactions using blockchain-based smart contracts; Computer software for managing cryptocurrency transactions using blockchain technology; Computer software for use as a cryptocurrency wallet;ANGRY MINER;
APPVELOPE Digicert, Inc. 2801 NORTH THANKSGIVING WAY SUITE 500 LEHI UT 84043 Computer software for encryption of application software; Computer software for deployment and management of application software across networks; Computer software for use in network management; Computer software for protecting and securing applications and data across networks;APPLICATIONS VELOPE ; APPLICATIONS DEVELOPEMENT;
APPWRAP Digicert, Inc. 2801 NORTH THANKSGIVING WAY SUITE 500 LEHI UT 84043 Computer software for encryption of application software across networks; Computer software for encryption of application software to be used on devices that require an internet protocol address; Computer software for securing the deployment and management of application software for use on devices that require an internet protocol address; Computer software for protecting and securing applications and data to be used on devices that require an internet protocol address;APP WRAP;
ARMORPLATE YOUR PC Preventon Technologies Limited Baylis House Stoke Poges Lane Slough Berkshire SL1 3PB United Kingdom Computer software for encryption, security, authorization, and anti-virus purposes; computer programs for controlling access to computers and networks; computer programs for controlling processes in computers; computer programs for protecting computers, servers and computer networks; magnetic tapes, magnetic discs, and other storage media storing the aforementioned computer software;ARMOR PLATE YOUR PC;
AUTHENTICA EMC CORPORATION 176 South Street Hopkinton MA 01748 Computer software for the encryption, access control, monitoring and protection of the contents of electronic documents for general use;
AUTHENTICA SECURITY TECHNOLOGIES EMC CORPORATION 176 South Street Hopkinton MA 01748 Computer software for the encryption, access control, monitoring, and protection of the contents of electronic documents;SECURITY TECHNOLOGIES;
AUTHENTICA SECURITY TECHNOLOGIES Authentica Security Technologies, Inc. 135 Second Avenue Waltham MA 02451 Computer software for the encryption, access control, monitoring, and protection of the contents of electronic documents;SECURITY TECHNOLOGIES;
AUTHENTICRYPT Futurex, L.P. 864 Old Boerne Rd Bulverde TX 78163 Computer software for encryption; computer hardware for encryption; electronic encryption units; computer technology, namely, hardware and software platforms for managing the user and device identity lifecycle; hardware and software for managing the enrollment, issuance, modification, revocation, and re-issuance of smart chip-based identity credentials;AUTHENTIC ENCRYPTION;
AUTOPW Amaani 17307 Rolling Brook Ct Sugar Land TX 77479 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;AUTO PW;Providing temporary use of on-line non-downloadable software and applications for encrypting digital files including email and attachments to email;
AVAPAY QUICKID PTY LTD 241-243 Abercrombie Street Darlington, NSW 2008 Australia Computer software for encryption;
BEDLAM Grey Heron Technologies P. O. Box 7485 Charlottesville VA 22906 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
BITGENOME GLOBAL SPECIMEN SOLUTIONS, INC. 8601 Six Forks Road, Suite 560 Raleigh NC 27615 Computer software for encryption of human biomedical research, genomic information, and bioinformatics; Computer software for encryption of genomic information in the field of clinical trials and clinical trials data; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed clinical trial patient biospecimen records and transactions; Software to record genomic information data to a blockchain or other ledger, and related technology, namely, an apparatus for recording genomic information data to a blockchain or other ledger; Computer software for collection, interpretation, evaluation, auditing, management, processing, tracking and viewing of data in the field of clinical trials; Computer software for data mining, data query, data processing and data analysis; Computer software for use in data mining and analysis, namely, for use in blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed human biomedical research, genomic information, bioinformatics and biospecimen transactions;BIT GENOME;
BITSPECIMEN GLOBAL SPECIMEN SOLUTIONS, INC. 8601 Six Forks Road, Suite 560 Raleigh NC 27615 Computer software for encryption of human biomedical research, genomic information, and bioinformatics; Computer software for encryption of genomic information in the field of clinical trials and clinical trials data; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed clinical trial patient biospecimen records and transactions; Software to record genomic information data to a blockchain or other ledger, and related technology, namely, an apparatus for recording genomic information data to a blockchain or other ledger; Computer software for collection, interpretation, evaluation, auditing, management, processing, tracking and viewing of data in the field of clinical trials; Computer software for data mining, data query, data processing and data analysis; Computer software for use in data mining and analysis, namely, for use in blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed human biomedical research, genomic information, bioinformatics and biospecimen transactions;BIT SPECIMEN;
BLOCKNKEY BlockNKey, Inc. 105 8th Avenue SE Suite 301 Olympia WA 98501 Computer software for encryption, encryption key management, and protecting data;BLOCK AND KEY;Software as a service (SAAS) services featuring software for use in encrypting and protecting data.; Software as a service (SAAS) services, namely, hosting software for use by others for use in encrypting and protecting data;
BLOCKSTACK BLOCKSTACK PBC 101 West 23rd Street, #224 New York NY 10011 Computer software for encryption; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed ledgers; Software for representation of data involved in and/or described in data transactions; Computer software platforms for enterprise blockchains; Application programming interface (API) software for development, testing, and integration of blockchain software applications to shared and/or distributed ledgers;BLOCK STACK;Application service provider featuring application programming interface (API) software for providing a platform for the development, testing, and integration of blockchain software applications; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of developing, testing, and integrating blockchain applications and software;
BLOCKSTACK BLOCKSTACK INC. 37 GREAT JONES STREET, 2ND FLOOR NEW YORK NY 10012 Computer software for encryption; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed ledgers; Software for representation of data involved in and/or described in data transactions; Computer software platforms for enterprise blockchains; Application programming interface (API) software for development, testing, and integration of blockchain software applications to shared and/or distributed ledgers;BLOCK STACK;Application service provider featuring application programming interface (API) software for providing a platform for the development, testing, and integration of blockchain software applications; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of developing, testing, and integrating blockchain applications and software;
BLOCKSTACK HALFMOON LABS INC. #6N-15 154 GRAND STREET NEW YORK NY 10013 Computer software for encryption; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed ledgers; Software for representation of data involved in and/or described in data transactions; Computer software platforms for enterprise blockchains; Application programming interface (API) software for development, testing, and integration of blockchain software applications to shared and/or distributed ledgers;BLOCK STACK;Application service provider featuring application programming interface (API) software for providing a platform for the development, testing, and integration of blockchain software applications; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of developing, testing, and integrating blockchain applications and software;
BLOCKSTACK Blockstack, Inc. 37 Great Jones Street, Floor 2 New York NY 10012 Computer software for encryption; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and/or distributed ledgers; Software for representation of data involved in and/or described in data transactions; Computer software platforms for enterprise blockchains; Application programming interface (API) software for development, testing, and integration of blockchain software applications to shared and/or distributed ledgers;BLOCK STACK;Application service provider featuring application programming interface (API) software for providing a platform for the development, testing, and integration of blockchain software applications; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of developing, testing, and integrating blockchain applications and software;
BLOOMBASE Bloombase Technologies Limited 22/F Aon Insurance Tower 3 Lockhart Road Wanchai Hong Kong Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Software for ensuring the security of electronic mail; Computer software for controlling and managing access server applications; Communications software for connecting computer network users, global computer networks; Computer hardware and software for setting up and configuring local area networks; Computer hardware and software for setting up and configuring wide area networks; Computer software for administration of computer local area networks; LAN (local area network) operating software; VPN (virtual private network) operating software; WAN (wide area network) operating software; Anti-spyware software; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable software for assuring data privacy, integrity, identity, authenticity; Entry/exit security portal comprised of an electronic passageway equipped with biometric devices for identification verification and detection of impermissible items being carried through; Computer software, namely, an application allowing sales and field service employees to update and receive data stored in an enterprise's computer databases in real time, using a mobile device, with full telephony integration with the telephone and/or software features of the mobile device; Enterprise software in the nature of a database for non-transactional data and a search engine for database content; Computer hardware, namely, firewalls; Computer software for the creation of firewalls; Secure terminals for electronic transactions; Computer programs for searching the contents of computers and computer networks by remote control; Electronic publications, namely, user manuals, instructions, and product updates featuring user information and product updates recorded on computer media; Computer software for assuring data privacy, integrity, user identity, access and authenticity;BLOOM BASE;
BURNCHAT Weway (Shenzhen) Network Technology Co., Ltd. Rm. 802, No. 2 Bld., Xunmei Tech Square Nanshan District, Shenzen City, Guangdon 518000 China Computer software for encryption; computer software for the transmission of images and photographs to telephones; computer software for organizing and viewing digital images and photographs; Data processing apparatus; computer game software;BURN CHAT;
CASTANET SECURE Marimba, Inc. 440 Clyde Avenue Mountain View CA 94043 computer software for encryption, authentication, code signing, and control over where and how applications can read and write information on client machines;
CELLSHIELD Innovative Routines International, Inc. 2194 HIGHWAY A1A SUITE 303 INDIAN HARBOUR BEACH FL 32937 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for profiling and protecting data in spreadsheets that were created using third party software;CELL SHIELD;
CHAINWORKS CHAINWORKS, INC. 2128 FELDOTT LANE NAPERVILLE IL 60540 Computer software for encryption; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and distributed ledgers; Software for representation of data involved in and described in data transactions; Computer software platforms for enterprise blockchains; Application programming interface (API) software for development, testing, and integration of blockchain software applications to shared and distributed ledgers;CHAIN WORKS;Computer services, namely, designing and implementing software-related technology solutions for others; Business technology software consultation services for the purpose of leveraging technology in the field of shared and replicated ledger systems; Computer technology consultancy in the field of blockchain technology and next generation technologies relating to shared/replicated ledger systems; Computer services, namely, analyzing, designing, architecting, and building software-related technology solutions for companies to leverage technology related to shared/replicated ledger systems;
CHAINWORKS Chainworks 2128 Feldott Lane Naperville IL 60540 Computer software for encryption; Software for enterprise blockchain development and implementation, execution and management of secure data transactions, management of data escrow, and provisioning of shared and distributed ledgers; Software for representation of data involved in and described in data transactions; Computer software platforms for enterprise blockchains; Application programming interface (API) software for development, testing, and integration of blockchain software applications to shared and distributed ledgers;CHAIN WORKS;Computer services, namely, designing and implementing software-related technology solutions for others; Business technology software consultation services for the purpose of leveraging technology in the field of shared and replicated ledger systems; Computer technology consultancy in the field of blockchain technology and next generation technologies relating to shared/replicated ledger systems; Computer services, namely, analyzing, designing, architecting, and building software-related technology solutions for companies to leverage technology related to shared/replicated ledger systems;
CIDISK Anti-Hacker Disk, Inc 9424 Eton Ave. Unit A Chatsworth CA 91311 Computer software for encryption;CI DISK;Computer and computer software rental;
CIPHERLINK Freedman Sharp and Associates Inc. Suite 508 1011 First Street, S.W. Calgary, Alberta T2J 1J2 Canada computer software for encryption of data;
CIPHERPOINT CipherPoint Software, Inc. 1730 Blake St., Suite 400 Denver CO 80202 Computer software for encryption;CIPHER POINT;
CIPHERVAULT Bilantic Software 100 Ring Road West Suite 214 Garden City NY 11530 Computer software for encryption and decryption of electronic documents;CIPHER VAULT;
CIPHERWIZARD Bilantic Software 100 Ring Road West Suite 214 Garden City NY 11530 Computer software for encryption and decryption of electronic documents;CIPHER WIZARD;
CLICK PROTECT SHARE WindTalker 3482 Keith Bridge Road, Suite 156 3482 Keith Bridge Road, Suite 156 Cumming GA 300415546 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software platforms for enabling secure storage and transmission of document, file, and data, and for editing documents into portable document format, tagged image file format, csf file format, drawing web format, three-dimensional file format, stereo lithography format, and isf file format;
CLOKED KMG Software, Inc. Suite 617 10 East Doty Street Madison WI 53703 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Downloadable computer software for file encription and transfer;CLOAKED;
CLOUDBRIDGE Bridge Data Systems, Inc. 115 East 87th St. Apt 34C New York NY 10128 Computer software for encryption; Computer software for providing an on-line database in the field of transaction processing to upload transactional data, provide statistical analysis, and produce notifications and reports; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software that assists computers in deploying parallel applications and performing parallel computations; Computer software to automate data warehousing; Computer software, namely, an application allowing sales and field service employees to update and receive data stored in an enterprise's computer databases in real time, using a mobile device, with full telephony integration with the telephone and/or software features of the mobile device;CLOUD BRIDGE;
COPPERHEAD Copperhead Limited 1400 Castlefield Avenue 112 Elizabeth Street, Suite 101 Toronto OntarioM5 Canada Computer software for encryption, namely, encryption toolsets; computer network interface hardening devices;Software services for cyber security, namely, secure software development, secure operating systems development, and internet security consultancy in the nature of code review and assessments; cyber security services, namely, providing computer security threat analysis for protecting data to prevent networks and operating systems from cyber attacks; computer forensic services, namely, malware forensics and mitigation; computer security consultancy in the nature of source code security testing and computer software security audits; Computer security consultancy in the field of incident response, operational security assessments, and penetration testing of networks and operating systems software to assess information security vulnerability; deployment of mobile security software; computer security consultancy in the nature of operations security and counterintelligence for preventing operating systems and software from cyberattacks;
COPYCRYPT ROCKET SOFTWARE, INC. 77 4th Avenue Waltham MA 02451 Computer software for encryption; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files;COPY CRYPT;
CRYPEDIT Sorvik, Paul Edward P.O. Box 251 North Bend WA 98045 Computer Software for the encryption and decryption of digital information, viewing and printing digital information, editing digital information, secure transport and storage of digital information, analyzing encrypted information, compressing and decompressing digital information, encoding and decoding digital information, secure deletion of digital information and creating and maintaining digital information access control files;
CRYPT-E-MAIL Garly Little 2525 Peachtree Rd. NE #12 The Gates Atlanta GA 30305 Computer software for encryption;ENCRYPTION-E-MAIL;
CRYPTIT Carrithers, David Lee 7001 S. La Cienega Blvd. Apt. 209 Los Angeles CA 90045 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;CRYPT IT;
CRYPTLIB Gutmann, Peter 11 Standish Place, Bayview Auckland 0629 New Zealand Computer software for encryption;
CRYPTO BUDDY Research Triangle Software, Inc. 1140 Kildaire Farm Rd. Cary NC 27511 Computer software for encryption and decryption of computer files and data;CRYPTO;
CRYPTO BUDDY Research Triangle Software, Inc. 1140 Kildaire Farm Rd. Cary NC 27511 Computer software for encryption and decryption of computer files and data;Color is not claimed as a feature of the mark.;CRYPTO;
CRYPTOAGENT FUJITSU SOFTWARE CORPORATION 3055 Orchard Drive San Jose CA 951342022 computer software for encryption of audio, visual, audio-visual, data, and textual computer files, and manuals supplied therewith;
CRYPTOCOLOR StrikeForce Technologies, Inc. Suite #603 1090 King Georges Post Road Edison NJ 08837 Computer software for encryption;CRYPTO COLOR;
CRYPTOPIA Futurex, L.P. 864 Old Boerne Rd Bulverde TX 78163 computer software for encryption; electronic encryption units; computer hardware for encryption; encryption key management structure and hierarchy, namely, computer software platforms for use in information security applications, namely those involving encryption, decryption, validation, and authentication of sensitive data;
CRYPTOTRONIX Cryptotronix 3514 Shallow Pond Drive Fort Collins CO 80528 Computer software for encryption; Electronic encryption units;Computer security consultancy; Computer consultation in the field of computer security; Design, development and engineering of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Research in the field of intelligence and security technology;
CUSTOMER MANAGED TRUST Ionic Security Inc. 101 Spear St, Ste 500 San Francisco CA 94105 Computer software for encryption; mobile device software for encryption; computer software platforms for data protection and privacy; computer software for data usage analytics and visibility; software for identity and credential management, application rights management and cloud discovery;CUSTOMER MANAGED;
CYPHRE CYPHRE SECURITY SOLUTIONS 302 AVONDALE, UNIT E HOUSTON TX 770063149 Computer software for encryption, namely, for electronic storage of data in the cloud, and to develop, deploy and integrate computer programs;The wording CYPHRE has no meaning in a foreign language.;Computer services, namely, providing a website featuring non-downloadable software for providing data encryption for electronic storage of data in the cloud, and providing software to develop, deploy and integrate computer programs;
D'AMO Penta Security Systems, Inc. 25-11, Yoido-dong, Youngdeungpo-ku Hanjin Shipping Building 20F Seoul Republic of Korea Computer software for encryption; Computer anti-virus software; Computer software for the creation of firewalls; Computer software for authorizing access to databases; Computer software for use in computer access control; Software for ensuring the security of electronic mail; Computer software for providing security to networks; Computer programs for use in ensuring the security of database; Software for ensuring the security of database; Computer software for providing secure access to computer and communication networks;
D@RE EMC CORPORATION 176 South Street Hopkinton MA 01748 Computer software for encryption;DARE;
DATA LIFELINE Technology Lifeline Inc. 1705 N Meridian Street Indianapolis IN 46202 Computer software for encryption; Computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Data compression software;DATA LIFE LINE;DATA;
DATABANK I/OMAGIC CORPORATION 20512 Crescent Bay Dr. Suite 106 Lake Forest CA 92630 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;DATA BANK;
DATABANK PORTABLE I/OMAGIC CORPORATION 20512 Crescent Bay Dr. Suite 106 Lake Forest CA 92630 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;DATA BANK PORTABLE;
DATAKEEP ESW HOLDINGS, INC. suite 206 911 Ranch Road 620 Lakeway TX 78734 Computer software for encryption, namely, to prevent outside intrusion and to manage data protection;DATA KEEP;
DEID, DE-ID De-ID Data Corp 374 Worthington Mill Road Richboro PA 18954 Computer software for encryption;Software design and development; Computer software design; Developing computer software;
DEKUSAN COBINHOOD LIMITED 39F, No.7, Section 5, Xinyi Road, Taipei City 11049 Taiwan Computer software for encryption; Computer software for managing and validating cryptocurrency transactions using blockchain-based smart contracts; Computer software for managing cryptocurrency transactions using blockchain technology; Computer software for use as a cryptocurrency wallet; Computer software for providing an interface between an internet browser and distributed computing platforms; Computer software for accessing distributed computing platforms; Computer software for providing a user interface for managing digital identities and for signing blockchain transactions; Computer software for securing digital identities; Computer software for execution and management of secure data transactions; Downloadable computer software for implementing blockchain transactions and for managing digital identities; Downloadable computer software for managing and verifying digital identities and associated data transactions utilizing blockchain-based platforms; Downloadable mobile applications for implementing blockchain transactions and for managing digital identities; Downloadable mobile applications for managing and verify digital identities and associated data transactions utilizing blockchain-based platforms;
DEMONSAW ERIC ANDERSON Huff Smith Law, LLC 369 S College Street Auburn AL 36830 Computer software for encryption;DEMON SAW;
DEXGUARD GuardSquare NV Tervuursevest 362/1 Leuven 3000 Belgium Computer software for encryption; Software for scanning, detecting, and removing viruses, worms, trojan horses, adware, spyware and malware; Software for protection of software applications against reverse engineering and hacking; Software for providing network, internet, computer, and communication security in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software; Software for providing online authentication and identity protection in the nature of computer software for authenticating user identification; Software for providing intrusion detection and prevention in the nature of computer software for the creation of firewalls; Software for the encryption and authentication of electronic information; Software for fraud protection in the nature of computer software for authenticating user identification; Software for cryptographic network security and data security functions in the nature of computer software for the creation of firewalls; Software for device fingerprinting in the nature of computer software for the identification of users and devices; Computer software for whitebox encryption; Software for secure keyboard in the nature of computer software for controlling the operation of secure keyboards; Software for biometric identity in the nature of downloadable middleware for authenticating users; Software for checking the security of the device and the application environment in the nature of computer anti-virus software; Software for visual hashes in the nature of computer software for generating visual hashes, namely, firmware for authenticating user identification; Software for optimizing applications in the nature of computer software for managing random-access memory while using system applications; Software for removing redundant data and resources from applications; Software for risk estimation in the nature of computer software for identifying risks for scanning and penetration testing of computers and networks to assess information security vulnerability; Computer software for building applications, namely, software development tools for the creation of secure mobile internet applications; Software for compiling applications in the nature of compiler software; Computer application software for providing digital security, namely, software for networks, internet, computers, communication in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software;DEX GUARD;Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design, development, and implementation of software for testing, analysis and consulting services in the field of security, access, authorization, authentication, encryption and identification systems for computers and networks; Testing of security systems; Computer services, namely, designing and implementing software in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, and communication hardening software for others; Research and development of technology in the field of protection of software applications; Research, development, design and upgrading of computer software in the nature of anti-spyware, anti-malware, application protection software, library protection software, obfuscation software, communication hardening software;
DIGIGONE C2 INTELLIGENCE AND TRAINING, INC. 11833 88 AVE N. Seminole FL 33772 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer storage devices, namely, flash drives; Computer storage devices, namely, jump drives; Computer storage devices, namely, thumb drives; Computer software for communicating with users of hand-held computers; Computer software for controlling and managing access server applications; Computer software for connecting Internet-capable devices in a secure and encrypted manner; Electronic encryption units; Communications software for connecting remote workstations to central servers, or remote workstations to other Internet-connected devices;DIGITAL GONE;
DIGIMETRICS Christian J. Hessler J 409 10343 Federal Blvd. Westminster CO 80260 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for data encryption, data security, verifying use identity in on-line transactions, providing secure access control to computer networks and websites, ensuring security of electronic mail, secure transmission of data over the Internet, and preventing network intrusion; Computer software for data encryption, data security, verifying use identity in on-line transactions, providing secure access control to computer networks and websites, ensuring security of electronic mail, secure transmission of data over the Internet, and preventing network intrusion that may be downloaded from a global computer network; Downloadable computer software for embedding in mobile applications;
DIGITAL DRINK CERTIFICATES Michael Logic Administration 340 N Ogden St. Chicago IL 60607 Computer software for encryption;
DIGITAL ID International Software Systems Solutions, Inc. 2200 NW 2nd Ave. Boca Raton FL 33431 Computer software for encryption;
DJIGZO Brinkers, Martijn 1e Constantijn Huygensstraat 67-3 Amsterdam Netherlands Computer software for encryption;
DNABIOKEY TODAY DNA Today 4445 Corporate Drive, Ste. 122 West Des Moines IA 50266 Computer software for encryption,and DNA identification;
DOCENCRYPT Kabushiki Kaisha PFU (dba PFU Limited) 98-2 NU, Unoke, Kahoku-shi Ishikawa Japan Computer software for encryption;DOC ENCRYPT;
DOCNCRYPT Amaani 17307 Rolling Brook Ct Sugar Land TX 77479 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;DOCUMENT ENCRYPTION;Data encryption and decoding services; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested; Providing temporary use of on-line non-downloadable software and applications for encrypting digital files including email and attachments to email;
DOCUTRUST Marlabs, Inc. One Corporate Place South Piscataway NJ 08854 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files;Computer security services in the nature of administering digital certificates; Computer security services in the nature of administering digital keys; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Data encryption services; Data encryption and decoding services; Design, development, and implementation of a software platform for authenticating and validating identity in digital documents using Blockchain technology; Digital compression of computer data; Digital watermarking; Electronic monitoring of credit card activity to detect fraud via the internet; Electronic signature verification services using technology to authenticate user identity; Computer services, namely, encrypted data recovery services;
DOTLOCK Atek, Inc. 17815 Newhope Street, Unit A Fountain Valley CA 92708 Computer software for encryption;DOT LOCK;
E-BUSINESS SERVER J.W. Lampi, Inc. 1322 81st Ave NE Minneapolis MN 55432 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
EBUSINESS MOGO, Inc. 414 Plaza Drive, Ste 200 Westmont IL 60559 Computer software for encryption; Computer software for the collection, editing, organizing, modifying, book marking, transmission, storage and sharing of data and information; Computer software that provides web-based access to applications and services through a web operating system or portal interface;Electronic data interchange services in the field of healthcare transactions such as claims, eligibility, claim status, electronic remittance advice, prior authorizations, attachments, referrals etc. that allow direct transaction and payment communications between healthcare providers and payers;ELECTRONIC BUSINESS;
ECIPHER Essential Security Software Inc. 11040 Main St Bellevue WA 98004 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Electronic encryption units;ELECTRONIC CIPHER;Data encryption services;
ECRYPT-IT Essential Security Software, Inc. 2828 North Farwood, Suite 1717 Dallas TX 75201 Computer software for the encryption of digital files, documents and email, including rights management of digital information, secure web form signing, and antivirus for encryption, digital rights management and digital certificates;
EEZY KEYZ IPRA Technologies Ltd Oy c/o Vapaudenaukio Technopolis 2, Valtakatu 51 FI-53100 Lappeenranta Finland Computer software for encryption; software for ensuring the security of electronic mail; data encryption apparatus; electronic encryption units; software for sending and receiving electronic mail and messages; downloadable computer security software;Transmission of encrypted electronic mail and encrypted electronic messages;EASY KEYS;KEYS;Data encryption and decoding services relating to electronic mail; encryption, decryption and authentication of information, messages and data relating to electronic mail; data decryption services relating to electronic mail; software as a service featuring software for encryption, decryption and authentication of electronic mail; updating of computer software relating to computer security and prevention of computer risks;
EMR DIRECT California Mediterranean PO Box 676011 Rancho Santa Fe CA 92067 Computer software for encryption;
ENCLOAK LUYSTER, FRANK C. 100 Riverside Lane Riverside CT 06878 COMPUTER SOFTWARE FOR ENCRYPTION; COMPUTER SOFTWARE TO INTEGRATE CRYPTOGRAPHIC SECURITY FEATURES INTO SOFTWARE APPLICATIONS DISTRIBUTED AS A UNIT WITH COMPUTER PROGRAMS FOR ALPHANUMERIC PROCESSING AND WORD PROCESSING, KEY AND FILE MANAGEMENT, DATA PROCESSING, DATA ACCESS, GRAPHICS, VIDEO IMAGING, DIGITAL AUDIO, DIGITAL TELEPHONY, COMMUNICATION OVER LOCAL AREA AND GLOBAL COMPUTER NETWORKS, AND DATABASES OF ENCRYPTION KEYS AND OTHER INFORMATION, NAMELY, FILES, IN THE FIELDS OF TELECOMMUNICATIONS, BUSINESS, SCIENTIFIC, TECHNICAL, COMMERCIAL, EDUCATIONAL AND PERSONAL COMPUTING;
ENCRYPT CHIP TECHNOLOGY Encrypt Chip Technology, Inc. 414 Church Street, Suite 205i Sandpoint ID 83864 Computer software for encryption; computer software for data protection featuring a multi-layered encrypted file format; computer software, hardware, and integrated circuits for encryption and decryption; computer software application for managing software encryption keys wherein the encryption keys are protected from disclosure by the user by employing multiple layers of encryption;Electronic storage of encrypted data; data encryption services in the field of payment card processing;
ENCRYPT EVERYTHING Centri Technology, Inc Suite 550 701 5th Avenue Seattle WA 98104 Computer software for encryption;
ENCRYPTABILITY WinAbility Software Corporation 115 W HOPE ST SAINT GEORGE UT 84770 Computer software for encryption;
ENCRYPTICS ENCRYPTICS 6850 AUSTIN CENTER BLVD. SUITE 320 AUSTIN TX 78731 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
ENCRYPTICS NL Systems Suite 820 1111 W. Mockingbird Lane Dallas TX 75247 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
ENCRYPTION: ON KEEPER SECURITY, INC. 820 W Jackson Blvd Suite 400 Chicago IL 60607 Computer software for encryption;ENCRYPTION;
ENCRYPTIONLOK INTELLIGENT DATA PROTECTOR LIMITED c/o Corporate Strategies, Inc. 123 N. Post Oak Ln., Suite 440 Houston TX 77024 Computer software for encryption of contents of a computer device;ENCRYPTION LOCK;
ENCRYPTO Encrypt Technologies (Cayman) Ltd. 67 Fort Street, 1st floor Artemis House P.O. Box 950 Grand Cayman Cayman Islands Computer software for encryption; Computer software for use in the encryption and decryption of digital files, namely, audio, video, text, binary, still images, graphics and multimedia files;Data encryption services; Providing a secure, web-based service featuring technology that enables individuals to remotely create and manage their own accounts so that whatever private content they upload now can be encrypted, then delivered to their intended recipients, at the time and in the manner requested;
ENCRYPTOMATIC Encryptomatic PO Box 124 Audubon MN 56511 Computer software for encryption;
ENCRYPTSTICK ENC SECURITY BV KEIZERSGRACHT 784, 1017 EC AMSTERDAM Netherlands Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; USB computer security key;
ENCRYPTSTICK ENC SECURITY SYSTEMS B.V. Keizergracht 784, 1017 EC Amsterdam Netherlands Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; USB computer security key;
ESSENTIAL SECURITY Essential Security Software, Inc 11040 Main Street Suite 100 Bellevue WA 98004 Computer software for the encryption of digital files, documents and e-mail featuring management of digital information, safety features for secure web form signing and virus protection;SECURITY;
ESSENTIAL SECURITY SOFTWARE Essential Security Software, Inc. 2828 North Farwood, Suite 1717 Dallas TX 75201 Computer software for the encryption of digital files, documents and email featuring rights management of digital information, secure web form signing, and anti-virus for encryption, digital rights management and digital certificates;SECURITY SOFTWARE;
EXCRYPT Futurex, L.P. 864 Old Boerne Rd Bulverde TX 78163 Computer software for encryption; computer hardware for encryption; electronic encryption units; hardware and software technology, namely, computer hardware and computer software platforms for data security purposes, namely, encrypting, decrypting, authenticating, and validating data;
FABRIK ULTIMATE BACKUP Fabrik Inc. Suite 200 1825 S. Grant Street San Mateo CA 94402 Computer software for encryption, storage, and local and remote online backup of files, documents, media, images, databases and data;Electronic storage of files, documents, media, images and data; electronic storage services for archiving databases, images and other electronic data;FABRIC ULTIMATE BACK UP;BACKUP;
FAKE BE GONE KOM Technologies 1043 Dresser CT Raleigh NC 27609 Computer software for encryption; Electronic equipment for point-of-sales (POS) systems, namely, point-of-sale terminals, bar code readers, optical readers, advertisement display monitors, keyboards, printers, scanners, radio transmitters, radio receivers, computer hardware, and computer operating software;FAKE;
FIELDSHIELD Innovative Routines International, Inc. 2194 HIGHWAY A1A SUITE 303 INDIAN HARBOUR BEACH FL 32937 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in field- or column-specific data protection and masking;FIELD SHIELD;
FILECRYPT VERIDIS SA-NV Avenue Fleming 2, parc scientifique Louvain-la-Neuve B-1348 Belgium Computer software for encryption and protection of data and transfer of files stored on computers, and manuals therefor distributed as a unit;FILE CRYPT;Consulting services in connection with designing, developing, using and maintaining computer software for encryption and protection of data and transfer of files stored on computers;
FITCOIN Joseph Fargnoli 4876 Santa Monica Ave #222 San Diego CA 92107 Computer software for encryption;FIT COIN;
FLASH PAPER Wilchcombe, Christopher Suite B 810 REGAL DRIVE HUNTSVILLE AL 35806 Computer software for encryption; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files;
FLASHPAPER Christopher Wilchcombe 810 Regal Drive, Suite B Huntsville AL 35806 Computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics, and multimedia files; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics, and multimedia files;FLASH PAPER;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A product distribution and payment system for limited use or otherwise restricted digital software products. Digital content data comprising a software product to be rented is made available to customers through a detachable local storage medium, such as a DVD or CD-ROM disc, or over a network connection. The product digital content is capable of being accessed and played back through a computer or game console at the customer site. The software product may comprise a limited use product that is restricted in the number of plays or duration of use. The customer is allowed to download and purchase the product using his computer or playback console. The product purchase information is encoded and transmitted to the content distributor. When the preset time or number of plays has elapsed the software program is frozen and access to the program is not allowed. In one embodiment of the present invention, a two-way, public key/private key encryption system is implemented to transmit the product and usage information between the server providing the software product and the customer computer system.