ELECTRONIC SECURITY TOKEN

Brand Owner (click to sort) Address Description
AUTHLET Evo Security Technologies 500 W 2nd Street, Suite 1900 Austin TX 78701 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;Technological research in the field of cyber and computer security; Technology consultation and research in the field of cyber and computer security; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Consulting in the field of information technology; Planning, design and implementation of computer technologies for others; Providing a secured-access, members only website featuring technology that gives members the ability to securely authenticate identity; Providing a website that gives computer users the ability to securely authenticate identity; Providing user authentication services using biometric hardware and software technology for e-commerce transactions; Providing user authentication services using biometric hardware and software technology for secure identity and access management; Providing user authentication services using single sign-on technology for online software applications; Providing user authentication services using one or more second factors for e-commerce transactions; Research and development of technology in the field of cyber and computer security;
AUTHORIZID AuthorizID 4080 Coaldale Dr. Loveland CO 80538 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Proximity sensors; Radio frequency identification (RFID) credentials, namely, cards and tags, and readers for radio frequency identification credentials; Wearable electronic proximity sensors with embedded contact tracing software for access and security purposes among wearers;AUTHORIZED;ID;
BAI2NDGEN Biometric Associates, L. P. Suite 304 9475 Deereco Road Timonium MD 21093 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication;BAI SECOND GENERATION; BAI TWO GENERATION;
BAIMOBILE BA100 HEADSET Biometric Associates, L. P. Suite 304 9475 Deereco Road Timonium MD 21093 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication;BAI MOBILE BA 100 HEADSET;
COMPKEY Health Billing Systems, Inc. #20 14700 28th Ave. N Plymouth MN 55447 electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;COMPUTER KEY;
CYBERONE CARD Ciright, Inc. 7 Union Hill Road Conshohocken PA 19428 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;CYBER ONE CARD;CARD;
DIRECT CRYPT TOKEN DIRECT CRYPT C/O LegalForce RAPC Worldwide 446 E Southern Ave Tempe AZ 85282 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;issuance of tokens of value; management of private equity funds;DIRECT AND TOKEN;
DRCT DIRECT CRYPT C/O LegalForce RAPC Worldwide 446 E Southern Ave Tempe AZ 85282 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;DIRECT CRYPT;issuance of tokens of value; management of private equity funds;
FOBID Ellenby Technologies, Inc. 412 Grandview Avenue Woodbury Heights NJ 08097 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;
IKEY Michella J. Guinan 3111 Picketts Harbor Drive Cape Charles VA 23310 Electronic security token in the nature of a fob-like device with computer software functionality used by an authorized user of a computer system for securing, organizing, maintaining, tracing, tracking, managing profiles, logins, credentials, passwords, and other authentication, security or identifying information of the authorized user; wearable device for securing, organizing, maintaining, tracing, tracking, managing profiles, logins, credentials, passwords, and other authentication, security or identifying information of the authorized user; computer software for cross-platform desktop, portable, mobile, wearable device used for securing, organizing, maintaining, tracing, tracking, managing profiles, logins, credentials, passwords, and other authentication, security or identifying information of the authorized user; computer software and software applications for biometric user identity verification and authentication and biometric credentials acquisition; computer software for authentication or identification purposes by means of storage of biometric features and comparison of the stored features; computer software featuring a multi-modal biometric identification and verification system designed for identity management in a cloud-based and online infrastructure; entry/exit security portal comprised of an electronic passageway equipped with biometric systems for identification verification and detection of authorized and unauthorized users;I KEY;
INTELEACCESS PAY TEL COMMUNICATIONS, INC. 4230 Beechwood Drive Greensboro NC 27410 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication, containing an internal programming used to authenticate, verify and validate identification of inmates to provide access to inmate account information;INTELLECT ACCESS;
INTELEKEY PAY TEL COMMUNICATIONS, INC. 4230 Beechwood Drive Greensboro NC 27410 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication for confinement facilities, containing an internal programming used to authenticate, verify and validate identification of company staff and facility officers;INTELLECT KEY;
LOGINTALK ROUMIT CO., LTD. 819ho, Mario Tower 8th floor 28, Digital-ro 30-gil, Guro-gu Seoul Republic of Korea Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Downloadable middleware for identifying and authenticating users and establishing inter-network accounting in the telecommunications field; Apparatus for checking the authenticity of users; Computer software for authenticating user identification; Downloadable smart phone application in the field of electronic security token; Computer operating software; Computer software for personal information management; Downloadable software in the field of electronic security token; Communications software for connecting computer network users; Apparatus for broadcasting, recording, transmission or reproduction of sound or images; Virtual reality game software; Communications software for connecting global computer networks; Computer operating programs; Cellular phones; Computer software for data processing; Data communications software; Software for processing digital images; Computer software for biometric systems for the identification and authentication of persons; Computer software for inter-network accounting in the telecommunications field; Biometric identification apparatus; Downloadable electronic sound; Downloadable digital video recordings; Downloadable electronic publications;LOGIN TALK;
NABI DREAMTAB NFC FUHU HOLDINGS, INC. Suite 540 909 N. Sepulveda Blvd. El Segundo CA 90245 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication; Computer application software for personal computers, handheld computers, and tablet computers, namely, software for authentication; Computer application software for mobile devices, namely, software for authentication; Computer software and hardware for security; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files;Toy figures incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology and accessories therefor;Embroidered patches incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology; novelty badges;Jewelry and watches incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology; jewelry boxes; Charms for jewelry and bracelets incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology;NABI DREAM TAB NEAR FIELD COMMUNICATION;The English translation of NABI in the mark is BUTTERFLY.;
NABI TAG FUHU HOLDINGS, INC. Suite 540 909 N. Sepulveda Blvd. El Segundo CA 90245 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication; Computer application software for personal computers, handheld computers, and tablet computers, namely, software for authentication; Computer application software for mobile devices, namely, software for authentication; Computer software and hardware for security; Computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files;Toy figures incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology and accessories therefor;Embroidered patches incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology; novelty badges;Jewelry and watches incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology; jewelry boxes; Charms for jewelry and bracelets incorporating Near Field Communication (NFC) technology and Radio-Frequency Identification (RFID) technology;The English translation of NABI in the mark is BUTTERFLY.;
ONEPASS CARD Ciright, Inc. 7 Union Hill Road Conshohocken PA 19428 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;ONE PASS CARD;CARD;
ONLYKEY CryptoTrust 73 fearrington post pittsboro NC 27312 Electronic security token in the nature of a fob-like device to store and generate passwords and OTPs and having a plurality of buttons and used to facilitate authentication on a computer system;ONLY KEY;
ONLYKEY COLOR CryptoTrust 73 fearrington post pittsboro NC 27312 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; USB (universal serial bus) hardware; USB computer access control key; USB computer security key; Computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files;ONLY KEY COLOR;COLOR;
PASSWORD BOOSTER Clubb, Kenneth Wayne 6145 Stevens Forest road Columbia MD 21045 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication; USB computer security key;PASSWORD;
QUICKLAUNCH MOBILE HEARTBEAT 51 Sawyer Road, Suite 320 Waltham MA 02453 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Electronic docking stations;QUICK LAUNCH;Computer security services in the nature of providing authentication to users by way of fob-like device, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Providing user authentication services using single sign-on technology for online software applications; Providing temporary use of non-downloadable computer software for enabling users to access and use hardware, namely, for providing user authentication to software on mobile devices;
REDLOCK RedLock, Inc. 555 Bryant St. #139 Palo Alto CA 94301 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication;RED LOCK;
SECURELOGIN Tripathi, Rohit, Kumar 10408 S 16th Avenue Phoenix AZ 85041 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication; Secure terminals for electronic transactions;SECURE LOGIN;
SIOMETRICS Sypris Electronics One Analog Way Wilmington MA 01887 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication;
SURITY Akemona, Inc. 2207 ARDEMORE DR FULLERTON CA 92833 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication;
UKI Dangerous Things Suite 366 336 36th Street Bellingham WA 98225 Electronic security token in the nature of a fob-like device used by an authorized user of a computer system facilitate authentication;
ULTRA WEARABLES Ryerson, Alexandre-Maximilian 236 Trafalgar St Annandale 2038 Australia Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Wearable activity trackers; Wearable computer peripherals; Wearable computers; Near field communication (NFC) tags for making payments, access control, public transport usage, digital identification, digital brand loyalty programs, medical records information, in-case-of-emergency information;WEARABLES;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A security system including a token and a host system. The token includes volatile random access memory for storing security data for use during a step of secure authentication, an interface for providing communication with a host system when coupled thereto, and a processor. The processor performs the steps of authenticating a host system and the token, providing secure information to the host system upon authentication therewith, and re-authenticating the host system and the token in response to receipt of the secure information after a reset of the token has occurred.