DOWNLOADABLE COMPUTER SOFTWARE AUTHENTICATION

Brand Owner (click to sort) Address Description
ATORUSVAL ATORUS RESEARCH, INC. 3553 West Chester Pike, No. 315 Newtown Square PA 19073 Downloadable computer software for authentication, verification or validation of open-source computer code used for statistical analysis, such as, for statistical analysis of clinical trial results or actuarial modeling for insurance;ATORUS VAL;Authentication, verification or validation of open-source computer code used for statistical analysis, such as, for analysis of clinical trial results or actuarial modeling for insurance;
AUGMENTED IDENTIFICATION ASSURED PRODUCTS GROUP 1 SE Ocean Blvd. Stuart FL 44994 Downloadable computer software for authentication and tracking of user and product identification, and for brand monitoring and protection against counterfeiting, tampering, and diversion, and to assure the identity, authenticity, voracity, integrity, and lineage of products, people, and services using proprietary algorithms and techniques utilizing encrypted industry standards to protect and preserve privacy and data integrity while associating specific identification attributes to assure accuracy and security;
AUTHX AuthX Security 1201 Seven Locks Road, Suite 214 Potomac MD 20854 Downloadable computer software for authentication of personal information;Providing temporary use of online non-downloadable software for authentication of personal information; Providing user authentication services using biometric hardware and software technology for obtaining access to computer software and computer systems; Providing user authentication services using two-factor technology for obtaining access to computer software and computer systems;
IDFM ACK VENTURES HOLDINGS Richman Firm 370 Camino Gardens Boulevard, Suite 303 Boca Raton FL 33432 Downloadable computer software for authentication of user identities, digital identification of authorized users, anti-fraud protection, communication sharing, digital advertising and identity management;
OPENVAL ATORUS RESEARCH, INC. 3553 West Chester Pike, No. 315 Newtown Square PA 19073 Downloadable computer software for authentication, verification or validation of open-source computer code used for statistical analysis, such as, for statistical analysis of clinical trial results or actuarial modeling for insurance;OPEN VAL;Authentication, verification or validation of open-source computer code used for statistical analysis, such as, for analysis of clinical trial results or actuarial modeling for insurance;
OPENVALJULIA ATORUS RESEARCH, INC. 3553 West Chester Pike, No. 315 Newtown Square PA 19073 Downloadable computer software for authentication, verification or validation of open-source computer code used for statistical analysis, such as, for statistical analysis of clinical trial results or actuarial modeling for insurance;OPEN VAL JULIA;Authentication, verification or validation of open-source computer code used for statistical analysis, such as, for analysis of clinical trial results or actuarial modeling for insurance;
OPENVALPY ATORUS RESEARCH, INC. 3553 West Chester Pike, No. 315 Newtown Square PA 19073 Downloadable computer software for authentication, verification or validation of open-source computer code used for statistical analysis, such as, for statistical analysis of clinical trial results or actuarial modeling for insurance;OPEN VAL PY;Authentication, verification or validation of open-source computer code used for statistical analysis, such as, for analysis of clinical trial results or actuarial modeling for insurance;
OPENVALR ATORUS RESEARCH, INC. 3553 West Chester Pike, No. 315 Newtown Square PA 19073 Downloadable computer software for authentication, verification or validation of open-source computer code used for statistical analysis, such as, for statistical analysis of clinical trial results or actuarial modeling for insurance;OPEN VAL R;Authentication, verification or validation of open-source computer code used for statistical analysis, such as, for analysis of clinical trial results or actuarial modeling for insurance;
OPENVALSOFT ATORUS RESEARCH, INC. 3553 West Chester Pike, No. 315 Newtown Square PA 19073 Downloadable computer software for authentication, verification or validation of open-source computer code used for statistical analysis, such as, for statistical analysis of clinical trial results or actuarial modeling for insurance;OPEN VAL SOFT;Authentication, verification or validation of open-source computer code used for statistical analysis, such as, for analysis of clinical trial results or actuarial modeling for insurance;
PROXIMIA Physical Web Defense 7, Inc. 509 S 22nd Ave Bozeman MT 59718 Downloadable computer software for authentication of humans, machines, devices and networks;
YIVE Yive 9801 Washingtonian Boulevard, Suite 200 Gaithersburg MD 20878 Downloadable computer software for authentication of personal information;Providing temporary use of online non-downloadable software for authentication of personal information; Providing user authentication services using biometric hardware and software technology for obtaining access to computer software and computer systems; Providing user authentication services using two-factor technology for obtaining access to computer software and computer systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A technique to control access to computer network resources at a computer facility permits a user to interact with the computer facility through a computer node of a network, wherein the user interaction comprises language learning responses submitted to the computer facility through the computer node, and a user authentication process is performed to determine if the permitted user interaction is authorized. The user authentication process is performed with user authentication information that is obtained by the computer facility during the permitted user interaction and also with user authentication information that is extracted from the user's language learning responses. In this way, user authentication occurs without intruding into the utilization of the computer facility.