MOBILE APPLICATION SOFTWARE AUTOMATING

Brand Owner (click to sort) Address Description
BE BOLD. BE SECURE. ONESPAN NORTH AMERICA INC. 121 W Wacker Drive, Suite 2050 Chicago IL 60601 Mobile application software for automating and securing the interaction between users and computer based business applications; software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; Cyber security software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; software for computer virus tracking and computer virus neutralization; Electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; Software development kits (SDK); computer security Software Development Kits (SDK); mobile application software security development kits (SDK); Software development kits (SDK) for authentication of user identities; Software development kits (SDK) for biometric security software; real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; software for logging, monitoring and securing computer software applications hosted by server computers and accessible via computer networks, including the internet and mobile networks; software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; Mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; computer anti-malware software; runtime application self-protection software, namely, computer anti-malware software; tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; device identification and device binding software namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; device fingerprinting software, namely, software for collecting information about the hardware utilized by a website visitor and creating a profile to identify the visitor; secure storage software, namely, software for secure electronic storage of data; secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications; Computer peripheral equipment; Smart card readers; USB hardware; USB smart card readers; USB tokens namely, USB computer access control key; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; Electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; Radio frequency identification (RFID) tags; Electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all for use in, for connecting to and for providing Public Key Infrastructures (PKI); Electronic identification devices, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; Electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; Software, mobile application software, and authentication security token hardware and smart card readers, all for optically capturing digital information; software, mobile application software, and authentication security token hardware and smart card readers, all for capturing and decoding 2D-barcodes; Electronic apparatus namely, fingerprint scanners and biometric retinal scanners, and software for use in the field of biometric identify verification; Electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for biometric systems for the identification and authentication of persons; Electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying biometric traits; Electronic apparatus, namely, fingerprint scanners and biometric retinal scanners, and software for capturing, analyzing and verifying fingerprints, retinal scan, voice, heartbeat, gait and vein patterns; Biometric readers, namely, fingerprint scanners and biometric retinal scanners; Face recognition software; software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, software for authenticating users based on the behavioral biometrics of these users; Software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; Software for capturing, analyzing and verifying geolocation data; Electronic apparatus and software for recording, processing, manipulating and analyzing sounds and images; Electronic apparatus, namely computer hardware and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; Electronic apparatus, namely, authentication security token hardware and smart card readers and software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; Electronic apparatus namely, computer hardware and software for providing multi-factor user authentication for security purposes; Electronic apparatus namely, computer hardware and software for providing layered security to protect data; Electronic apparatus namely, computer hardware and software for continuous, transparent and frictionless user authentication for identification purposes; software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; Electronic apparatus namely, computer hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, computer hardware and software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, computer hardware and software for securing access to and operation on the Internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; Electronic apparatus namely, computer hardware and software for secure data-transfer by electronic means and via computer networks; Electronic apparatus namely, computer hardware and software for identification of persons; electronic apparatus, namely, computer hardware and software for providing, verifying and proving the identity of persons; Electronic apparatus, namely, computer hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; Electronic apparatus, namely, computer hardware and software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; Electronic apparatus, namely, computer hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks; Electronic apparatus, namely, computer hardware and software for digital certificate and encryption key management in the field of Public Key Infrastructures (PKI); Electronic apparatus, namely, computer hardware and software used for securing electronic and online transactions; Electronic apparatus, namely, computer hardware and software for providing of irrevocable and authenticated electronic and online transactions; Electronic apparatus, namely, computer hardware and software for the certification of orders given via computer and certifying electronic instructions for transactions; Electronic apparatus, namely, computer hardware and software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; Electronic apparatus, namely, computer hardware and software used for ensuring the security of electronic banking operations and bank transactions; Electronic apparatus, namely, computer hardware and software for securing internet banking electronic transactions; Electronic apparatus, namely, computer hardware and software used for ensuring the security and authentication of sales orders transactions given by computer; Electronic apparatus, namely, computer hardware and software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; software for assessing the security risk associated with end user identities; Electronic apparatus, namely, computer hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; Electronic apparatus, namely, computer hardware and software for securing and protecting access to virtual, electronic and digital assets; Electronic apparatus, namely, computer hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; Electronic apparatus, namely, computer hardware and software for creating, managing and transferring distributed ledgers and blockchains; Electronic apparatus, namely, computer hardware and software for creating, managing and transferring digital data; Electronic apparatus, namely, computer hardware and software for authenticating, certifying and controlling access to digital data; Electronic apparatus, namely, computer hardware and software for creating, managing, controlling the use, modification, and distribution of copyrighted works; Electronic apparatus, namely, computer hardware and software for storing, managing, encrypting, and protecting access to personal data; Electronic apparatus, namely, computer hardware and software for storing, managing and controlling access to personal identity information; software for use for customer enrollment, customer management and electronic transactions; Electronic apparatus, namely, computer hardware and transactional software for securing electronic payment services, internet banking and mobile banking services; Electronic apparatus, namely, computer hardware and software for governments to communicate and interact with citizens; software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; Software programs allowing users to electronically approve documents using secure electronic signatures; Electronic apparatus, namely, computer hardware and software for the recording, the manipulation, the archiving, the security, the encoding of sound, images and data, including via the Internet; Software for capturing an approval of an electronic or online electronic transaction; software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; software for signing electronic documents; software for capturing electronic document signatures; Software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; software for securing electronic forensic evidence relating to the business transaction process and documents; Electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; Software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; Software for capturing and storing data documenting an electronic signature process; software for capturing and storing data documenting electronic delivery of documents and information; Software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; software for viewing and reviewing electronic signature data; Software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; software for viewing and reviewing data documenting electronic delivery of documents and information; software for reviewing and verifying electronic forensic evidence data files; document management software for reproducing an authorization and approval process of electronic transactions and documents; document management software for reproducing a signing process of electronic transactions and documents; Software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files;Telecommunication services, namely, data transfer via the Internet and via computer networks; secure data-transfer via computer networks; consultancy concerning securing telecommunication for secure data transfer via telecommunications; Providing access to telecommunications networks; Providing private and secure real time electronic communication over a computer network; providing access to telecommunications networks especially through secured telecommunication networks by means of online authentication of electronic signatures and online generation and verification of authentication credentials and electronic signatures; providing transmission of secured online transactions and secured data transfer by electronic means; secure transfer of data by telecommunications; Services of providing access to telecommunication networks; providing electronic communication by computer networks; providing electronic transmission of secure e-mail; secure automatic transmission of digital data using telecommunications channels; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network of information by electronic means; secure data transmission services; secure digital transmission of data via the internet; secure electronic transmission and retransmission of sounds, images, documents, messages and data; secured data, sound and image transmission services; transmission of coded messages and images; transmission of encrypted communications; Information, advisory and consultancy services in relation to all the aforesaid services; Telecommunication consultation in the nature of technical consulting in the field of audio, text and visual data transmission and communication;SECURE;Computer hosted, online and cloud-based cyber security services, namely, software as a service for providing cyber security; Services in the field of electronic and digital signatures, data protection and data traffic, encryption; authentication, issuance, validation, revocation and blacklisting of digital certificates; providing cyber security services in the nature of electronic authorization, authentication and identification of persons; data encryption; development of electronic identification (ID) products namely, computer hardware and software; Providing Online user authentication of electronic signatures, namely, Electronic signature verification services using technology to authenticate user identity in connection with banking transaction services; Electronic signature verification services using technology to authenticate user identity; provision of security services for limiting access to computer networks, computers and completing computerized transactions; computer security services namely, restricting unauthorized access to computer networks for protection against illegal and illegitimate network access; Online authentication of electronic signatures, namely, electronic signature verification services using technology to authenticate user identity; Online security services, namely, providing security for electronic transactions, namely, Data encryption and authentication services for providing security and anonymity for electronically transmitted transactions; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals; computer security services, namely, protecting computers, web sites and databases against unauthorized access by restricting unauthorized network access users without credentials; Computer security services, namely, controlling access privileges of users of computing resources for computers, electronic networks, web sites and databases based on assigned credentials; computer network data transmission and transactions encryption, authentication and management services; computer security services, namely, controlling access privileges of users of computing resources to web sites, computers and databases; providing secure and authenticated access to computer networks, web sites, electronically accessible applications and computer applications namely, controlling access privileges of users of computing resources based on assigned credentials; providing secured online transactions and secured data transfer by electronic means, namely, providing user authentication services using biometric hardware and software technology for e-commerce transactions; Data encryption and authentication services for providing security against fraud for electronic transactions for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; providing user authentication services, namely, electronic signature and digital credential verification services using technology to authenticate user identity, user passwords, digital credentials and electronic signatures; providing user authentication services, namely, electronic signature and digital credential verification services using technology to authenticate user identity, user passwords, digital credentials and electronic signatures used to authorize transactions and access networks and online services; Monitoring of computer systems for security purposes in the nature of monitoring data transmission and online transactions for access by unauthorized users; providing user authentication services using single sign-on technology, biometric hardware and software technology for e-commerce transactions; electronic signature and digital credential verification services for security purposes using technology to authenticate user identity; Online identity management services, namely, electronic signature and digital credential verification services using technology to authenticate user identity; online trusted identity management services; online access management services, namely, providing an interactive web site featuring technology that enables users to access data; computer security services, namely, online generation and verification of authentication credentials and electronic signatures for restricting unauthorized network access by users without credentials; Data security consultancy; Online services in the field of protecting digital data namely, secure storage and management of digital data; Online services for authenticating, encrypting, securely storing and certifying digital data; Online services in the field of protecting personal data, namely, electronic data storage; Online services in the field of privacy protection, namely, personal data security consultancy services; Online and cloud-based real-time fraud prevention services, namely, data security consultancy services; Computer hosted, online and cloud-based computer security services and software as a service for monitoring, detecting and blocking of fraudulent transactions by restricting unauthorized network access by users without credentials; Computer hosted, online and cloud-based computer security services and software as a service for analyzing, and detecting unusual patterns in, user and electronic transaction data including behavioral and contextual data; software as a service featuring software for data security; rental of computer software; providing temporary use of non-downloadable software applications accessible via a web site for data storage and data security; Rental of internet security computer software programs; Computer services, namely, hosting an interactive web site that allows users to assess vulnerabilities regarding fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote e-commerce transactions; online and cloud based services, namely, consultancy services for fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote e-commerce transactions; software as a service for network, application and hardware assessment for fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote e-commerce transactions; Computer services, namely, hosting an interactive web site that allows users to perform risk analysis, including risk analysis of electronic and remote electronic transactions, electronic transaction requests, and user account access requests; online and cloud based services, namely, network, application and hardware analysis for risk analysis, including risk analysis of electronic and remote electronic transactions, electronic transaction requests, and user account access requests; software as a service for risk analysis, including risk analysis of electronic and remote electronic transactions, electronic transaction requests, and user account access requests; Computer services, namely, hosting an online accessible service for analyzing application and network user vulnerability to cybersecurity threats; Computer services, namely, software as a service for the management of cybersecurity services; Computer services, namely, software as a service for securing electronic and online e-commerce transactions; online and cloud based services, namely, providing access to an application or online accessible service for securing electronic and e-commerce transactions; software as a service featuring software for securing electronic and e-commerce transactions; software as a service to record and store a user's approval of an electronic and online e-commerce transaction; software as a service for capturing an approval of electronic and e-commerce transactions; software as a service featuring software for recording and storing approval of an electronic and online e-commerce transaction; software as a service featuring software for generating and storing electronic proof of an authorization of an electronic and online ecommerce transactions and documents; Computer services, namely, hosting an interactive web site that allows users to generate electronic signatures for ecommerce transactions and electronic documents; software as a service featuring software for users to generate electronic signatures for ecommerce transactions and electronic documents; Computer services, namely, hosting an interactive web site that allows for electronically signing electronic and e-commerce transactions; software as a service featuring software for electronically signing electronic and online e-commerce transactions; Computer services, namely, hosting an interactive web site that allows users to sign electronic documents; software as a service featuring software for signing electronic documents; software as a service featuring software for capturing images of electronic document signatures; computer services, namely, hosting an interactive web site that allows users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software as a service featuring software to electronically send, sign, receive and manage documents as part of an electronic business transaction; Computer services, namely, hosting an interactive web site that allows users to collect data for ensuring the legal enforceability, regulatory compliance and auditability of documents and business transactions; software as a service featuring data collection software for ensuring the legal enforceability, regulatory compliance and auditability of documents and business transactions; Computer services, namely, hosting an interactive web site that allows users to obtain secure electronic forensic evidence relating to the business transaction process and documents; online and cloud based services, namely, providing access to an application for obtaining secure electronic forensic evidence relating to the business transaction process and documents; software as a service featuring data collection software for obtaining secure electronic forensic evidence relating to the business transaction process and documents; software as a service featuring software tools for Electronic signature and e-commerce transaction management allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; online and cloud based services, namely, internet based data capture services for capturing and storing electronic evidence data, audit trail data and electronic signature data; software as a service featuring software for capturing and storing electronic evidence data, audit trail data and electronic signature data; software as a service featuring software for capturing and storing electronic evidence data, audit trail data that allows reproducing exactly what a signer saw and did on a website page or electronic document or during an ecommerce transaction; software as a service featuring software for capturing and storing data documenting an electronic signature process; software as a service featuring software for capturing and storing data documenting an electronic signature process; Computer services, namely, hosting an interactive web site that allows for capturing and storing data documenting electronic delivery of documents and information; software as a service featuring software for capturing and storing data documenting electronic delivery of documents and information; software as a service featuring software for viewing and reviewing electronic evidence data, audit trail data and reviewing electronic signature data; Computer services, namely, hosting an interactive web site that allows viewing and reviewing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did in the context of the process of electronically signing the document; software as a service featuring software for viewing and reviewing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did on the document; Computer services, namely, hosting an interactive web site that allows viewing and reviewing data documenting an electronic signature process for documents and ecommerce transactions; software as a service featuring software for viewing and reviewing data documenting an electronic signature process for documents and ecommerce transactions; software as a service featuring software for viewing and reviewing data documenting electronic delivery of documents and information; software as a service featuring software for reviewing and verifying electronic forensic evidence data files; software as a service featuring software for reproducing a record of an electronic authorization and approval process of an electronic transaction and document; software as a service featuring software for reproducing a record of digital signature for an electronic transaction and document; software as a service featuring software for creating a digital record and automation of business processes, namely, adding new customer information to a database; Services for the secure storage of electronic documents; Information, advice and consultancy relating to the aforesaid services, whether or not via the Internet; Computer technology consultancy; technical consultancy in the field of information and communication technology (ICT); Consultancy in the field of cyber security, internet security, computer security, computer network security, data security, data cryptography, electronic signature verification services using technology to authenticate user identity, electronic signature verification services using technology to authenticate user identity for electronically signing documents, and using data cryptography for making secure data transmissions and bank transactions via computer networks and telecommunication networks; consultancy in the field of software and technology for electronic document management; Quality control for others provided by computer professionals in the field of security and certification of telecommunications; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability of telecommunications; cyber security vulnerability testing, namely, computer security consultancy in the field of penetration testing of computers and networks to assess information security vulnerability; vulnerability testing and security testing of electronic systems, computer systems, computer based applications, remotely accessible applications, computer software, sever software and mobile application software, namely, computer security consultancy in the field of penetration testing of computers, software and networks to assess information security vulnerability; Consultancy in the field of fraud detection, risk detection, risk management, fraud analysis and fraud prevention, in the field of electronic, digital, online and remote e-commerce transactions, namely, electronic monitoring of electronic, digital or online transactions to detect fraud via the internet; Computer programming and software customization of data processing equipment; computer Software research; conducting computer software research studies; Design, development, customization, installation, updating and maintenance of computer software; computer programming; technical research in the fields of cyber security, authentication and electronic signatures; scientific research; design of a digital archive, namely, a database; development of software for managing and providing access to electronic documents, database archives and digital documentation records; Design, development, and implementation of software for the purpose of operating data communications networks; Design, development, customization, installation, updating and maintenance of software; Designing, developing, customizing, installing, updating and maintaining computer software in the field of cyber security, internet security, computer security, computer network security, data security, cryptography of digital files, Electronic signature and credential verification services using technology to authenticate user identity and electronic transactions, verification services for electronically signing documents, and making secure data transmissions and banking transactions via computer networks and telecommunication networks; Computer programming services for electronic data security; design and development of electronic data security systems; computer programming of internet security programs; design and development of internet security programs; Design, development, customization, installation, updating and maintenance of computer software relating to computer security and prevention of computer security risks; testing, analysis and evaluation services of the telecommunications of the services of others to determine conformity with certification standards and designing, updating and maintaining computer software of others used for computer network security and analysis of electronic instructions for computer network security of others to determine conformity with certification standards; Designing, developing, updating and maintaining computer software in the field of electronic document management; Research in the field of computer network security; technical research relating to automatic identification and authentication systems to identify and authenticate users of computer network systems and software; Computer security services for securing remote communication and providing secure network communications, providing secure and authenticated user access to computer networks and websites, providing secure and authenticated user access to computer networks, web sites on computer networks, electronically accessible applications in data networks and computer applications in data networks namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities;
NOT JUST GROUND BREAKING, EARTH SHAKING Truckpay Inc. 15 Central Avenue Tenafly NJ 07670 Mobile application software for automating logistics in the construction industry and for enabling the auctioning of construction jobs by construction companies and subcontractors; Downloadable computer software for automating logistics in the construction industry and for enabling the auctioning of construction jobs by construction companies and subcontractors;Providing a website featuring non-downloadable software for automating logistics in the construction industry and enabling the auctioning of construction jobs by construction companies and subcontractors; Software as a service (SAAS) services featuring software for automating logistics in the construction industry and enabling the auctioning of construction jobs by construction companies and subcontractors;
ONESPAN ONESPAN NORTH AMERICA INC. 121 W Wacker Drive, Suite 2050 Chicago IL 60601 Mobile application software for automating and securing the interaction between users and computer based business applications; software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications; Cyber security software; authentication server software; authentication library software; downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications and for ensuring authenticity and integrity of electronic transactions; software for network and device security for restricting unauthorized access to computers, computer networks, websites, computer-based applications; software for application, transaction and identity security related to mobile device applications for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications; software for data security for authenticating, enforcing, restricting and controlling access privileges to users and for ensuring authenticity and integrity of transactions submitted by users; software for ensuring the security of electronic mail by authenticating, enforcing, restricting and controlling access privileges to users; Electronic publications, namely, journals, books, manuals, magazines, brochures, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography; Software development kits (SDK); computer security Software Development Kits (SDK); mobile application software security development kits (SDK); Software development kits (SDK) for authentication of user identities; Software development kits (SDK) for biometric security software; real-time fraud prevention software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; software for monitoring, detecting and blocking of fraudulent electronic transactions submitted to computer-based applications; software for logging, monitoring and securing of computer-based services accessible via computer networks, including the internet and mobile networks; software for analyzing, and detecting unusual patterns in user and transaction data including behavioral and contextual data; software for behavioral analytics for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; Mobile application security software for authenticating, enforcing, restricting and controlling access privileges to users of mobile device applications and computer-based applications and for ensuring authenticity and integrity of transactions submitted by users of mobile device applications and computer-based applications; software for protecting mobile applications against cyber threats, computer viruses, phishing attacks, computer malware, man-in-the-middle attacks; software for detecting, preventing and reporting mobile cyber attacks against computer-based applications; computer anti-malware software; runtime application self-protection software, namely, computer anti-malware software; tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; device identification and device binding software, namely, software for identifying an individual electronic device, and software for binding a software application instance to an individual electronic device; device fingerprinting software, namely, software for generating a fingerprint of a computing device; secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems; electronic apparatus, namely, smart cards, smart card readers, USB tokens and authentication tokens for enabling secure telecommunications; Computer peripheral equipment; Smart card readers; wireless radio enabled devices, namely, authentication tokens with a wireless radio interface; USB hardware; USB smart card readers; USB tokens, namely, USB computer access control key; Electronic key fobs, namely, hardware authentication tokens; blank smart cards embedded with transponders; encoded smart cards containing program instructions used to authenticate users or to store PKI certificates; replacement parts and fittings for all the aforesaid goods; Electronic apparatus, namely, hardware authentication tokens, USB hardware, USB security tokens, and encoded smart cards, all the foregoing containing programming used for security, authentication and encryption; cards encoded with security features for identification purposes; electronic security tags; Electronic apparatus, namely, hardware authentication tokens, computer peripheral equipment, USB hardware, USB security tokens containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, and encryption keys, smart cards encoded with program instructions used to store personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all containing program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys or encryption keys all for use in the field of cyber security, internet security, computer security, computer network security and cryptography; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use, personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer software and mobile application software, all for electronic generation and verification of authentication credentials and signatures; Electronic apparatus, namely, computer peripheral equipment, USB hardware, USB security tokens, smart cards encoded with program instructions used to store, generate or use personal identification or authentication data, personal identification numbers, PKI certificates, cryptographic keys and encryption keys, smart card readers, authentication security token hardware and software, computer server software and mobile application software, all for use in, for connecting to and for providing Public Key Infrastructures (PKI); Electronic identification devices, namely, authentication tokens, programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers; Electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases; Software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers adapted to optically capture digital information; software, mobile application software, electronic apparatus, namely, authentication security token hardware and smart card readers for capturing and decoding 2D-barcodes; software for use in the field of biometric identify verification; software for biometric systems for the identification and authentication of persons; software for capturing, analyzing and verifying biometric traits; software for capturing, analyzing and verifying fingerprints; Face recognition software; software for capturing, analyzing and verifying behavioral biometrics; behavioral authentication software, namely, software for authenticating users based on the behavioral biometrics of these users; Software for behavioral biometrics, namely, for recording and analyzing dynamic keystrokes and swiping finger patterns on mobile device input screens; Software for capturing, analyzing and verifying geolocation data; Electronic apparatus and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography; Electronic apparatus, namely, authentication security token hardware and smart card readers and software, computer server software and mobile application software for data encryption and authentication in the fields of security, data security, and user authentication; Electronic apparatus hardware and software for providing multi-factor user authentication for security purposes; Electronic apparatus, namely, hardware and software for providing layered security to protect data; Electronic apparatus, namely, hardware and software for continuous, transparent and frictionless user authentication for identification purposes; software for coordinating and orchestrating user authentication and cyber security for authenticating, enforcing, restricting and controlling access privileges to users of mobile devices and applications; Electronic apparatus, namely, hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing telecommunications, data communications, electronic communications and digital communications by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications; Electronic apparatus, namely, hardware and software for securing access to and operation on the Internet by authenticating, enforcing, restricting and controlling access privileges to users of computers, mobile devices and applications; Electronic apparatus, namely, hardware and software for secure data-transfer by electronic means and via computer networks; Electronic apparatus, namely, hardware and software for identification of persons; electronic apparatus, namely, hardware and software for providing, verifying and proving the identity of persons; Electronic apparatus, namely, hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions; Electronic apparatus, namely, hardware and software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases; Electronic apparatus, namely, hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks; Electronic apparatus, namely, hardware and software for digital certificate and encryption key management in the field of Public Key Infrastructures (PKI); Electronic apparatus, namely, hardware and software used for securing electronic and online transactions; Electronic apparatus, namely, hardware and software for providing of irrevocable and authenticated electronic and online transactions; Electronic apparatus, namely, hardware and software for the certification of orders given via computer and certifying electronic instructions for transactions; Electronic apparatus, namely, hardware and software for secure electronic transaction authentication for use in the field of banking and online consumer transactions; Electronic apparatus, namely, hardware and software used for ensuring the security of electronic banking operations and bank transactions; Electronic apparatus, namely, hardware and software for securing internet banking electronic transactions; Electronic apparatus, namely, hardware and software used for ensuring the security and authentication of sales orders transactions given by computer; Electronic apparatus, namely, hardware and software for use in the field of risk analysis, namely, risk analysis of electronic and remote electronic transactions, electronic transaction requests, and electronic network, account and computer access requests; software for assessing the security risk associated with end user identities; Electronic apparatus, namely, hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote electronic transactions; Electronic apparatus, namely, hardware and software for securing and protecting access to virtual, electronic and digital assets; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies; Electronic apparatus, namely, hardware and software for creating, managing and transferring distributed ledgers and blockchains; Electronic apparatus, namely, hardware and software for creating, managing and transferring digital data; Electronic apparatus, namely, hardware and software for authenticating, certifying and controlling access to digital data; Electronic apparatus, namely, hardware and software for creating, managing, controlling the use, modification, and distribution of copyrighted works; Electronic apparatus, namely, hardware and software for storing, managing, encrypting, and protecting access to personal data; Electronic apparatus, namely, hardware and software for storing, managing and controlling access to personal identity information; software for use for customer enrollment, customer management and electronic transactions; Electronic apparatus, namely, hardware and transactional software for securing electronic payment services, internet banking and mobile banking services; Electronic apparatus, namely, hardware and software for governments to communicate with and provide services to citizens; software for creating and managing electronic signature applications and systems, including administrative and user applications and digital storage systems; Software programs allowing users to electronically approve documents using secure electronic signatures; Electronic apparatus, namely, hardware and software for the security, the encoding of sound, images and data, including via the Internet; Software for capturing an approval of an electronic or online electronic transaction; software for generating and capturing electronic proof of authorization of electronic and online electronic transactions and documents; software for generating electronic signatures; software for electronically signing electronic and online electronic transactions; software for signing electronic documents; software for capturing electronic document signatures; Software for electronic document management; software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction; software for authenticating and certifying the legal enforceability, regulatory compliance and auditability of documents or transactions; software for securing electronic forensic evidence relating to the business transaction process and documents; Electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; software for capturing and storing electronic data; software for capturing and storing audit trail data of electronic, digital and online transactions; Software for capturing and storing electronic signature data; software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature; software for capturing and storing audit trail data of electronic, digital and online transactions that allows reproducing exactly what a signer of an electronic document saw and did in making the electronic signature; Software for capturing and storing data documenting an electronic signature process; software for capturing and storing data documenting electronic delivery of documents and information; Software for viewing and reviewing electronic evidence data files; software for viewing and reviewing audit trail data files; software for viewing and reviewing electronic signature data; Software for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature or transaction; software for viewing and reviewing audit trail data files that allows reproducing exactly what a signer of an electronic document saw and did when using a document; software for viewing and reviewing data files documenting an electronic signature process; software for viewing and reviewing data documenting electronic delivery of documents and information; software for reviewing and verifying electronic forensic evidence data files; document management software for reproducing an authorization and approval process of electronic transactions and documents; document management software for reproducing a signing process of electronic transactions and documents; Software for securely storing electronic document files; electronic vaulting software, namely, software for securely storing electronic document files; all the aforementioned to the exception of computer hardware and computer software for formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking, in particular in the field of semiconductor production;Providing access to telecommunications networks; Providing private and secure real time electronic communication over a computer network; providing access to telecommunications networks especially through secured telecommunication networks by means of online authentication of electronic signatures and online generation and verification of authentication credentials and electronic signatures; Services of providing access to telecommunication networks; Information, advisory and consultancy services in relation to all the aforesaid services; all the aforementioned services to the exception of education, providing of training, arranging and conducting of workshops and training courses, computer training; all of the aforementioned exceptions only for formal verification, this does not include personal identity verification and authentication, and sequential equivalence checking purposes, in particular in the field of semiconductor production;ONE SPAN;Computer hosted, online and cloud-based cyber security services, namely, software as a service for providing cyber security; Services in the field of electronic and digital signatures, data protection and data traffic, encryption; issuing and management of digital certificates for encryption or authentication; providing cyber security services in the nature of electronic authorization, authentication and identification of persons; data encryption; development of electronic identification (ID) products, namely, hardware and software; Providing Online user authentication of electronic signatures, namely, Electronic signature verification services using technology to authenticate user identity in connection with banking transaction services; Electronic signature verification services using technology to authenticate user identity; provision of security services for limiting access to computer networks, computers and completing computerized transactions; computer security services, namely, restricting unauthorized access to computer networks for protection against illegal and illegitimate network access; Online authentication of electronic signatures, namely, electronic signature verification services using technology to authenticate user identity; Online security services, namely, providing security for electronic transactions, namely, Data encryption and authentication services for providing security and anonymity for electronically transmitted transactions; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals; computer security services, namely, protecting computers, web sites and databases against unauthorized access by restricting unauthorized network access users without credentials; Computer security services, namely, controlling access privileges of users of computing resources for computers, electronic networks, web sites and databases based on assigned credentials; computer network data transmission and transactions encryption, authentication and management services; providing security by controlling access to web sites, computers and databases; providing secure and authenticated access to computer networks, web sites, electronically accessible applications and computer applications, namely, controlling access privileges of users of computing resources based on assigned credentials; providing secured online transactions and secured data transfer by electronic means, namely, providing user authentication services using biometric hardware and software technology for e-commerce transactions; Data encryption and authentication services for providing security against fraud for electronic transactions for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; providing user authentication services, namely, electronic signature and digital credential verification services using technology to authenticate user identity, user passwords, digital credentials and electronic signatures; providing user authentication services, namely, electronic signature and digital credential verification services using technology to authenticate user identity, user passwords, digital credentials and electronic signatures used to authorize transactions and access networks and online services; Monitoring of computer systems for security purposes in the nature of monitoring data transmission and online transactions for access by unauthorized users; providing user authentication services using single sign-on technology, biometric software technology for e-commerce transactions; electronic signature and digital credential verification services for security purposes using technology to authenticate user identity; Online identity management services, namely, electronic signature and digital credential verification services using technology to authenticate user identity; online trusted identity management services; digital identity management services; online access management services, namely, providing an interactive web site featuring technology that enables users to access data; computer security services, namely, online generation and verification of authentication credentials and electronic signatures for restricting unauthorized network access by users without credentials; online identity brokerage services ; Data security consultancy; Online services in the field of protecting digital data, namely, secure electronic storage of digital data; online services, namely, application service provider (ASP) featuring software for authenticating, encrypting, securely electronically storing and certifying electronic data; Online services in the field of protecting personal data, namely, electronic data storage; Online services in the field of privacy protection, namely, personal data security consultancy services; Online and cloud-based real-time fraud prevention services, namely, data security consultancy services; Computer hosted, online and cloud-based computer security services and software as a service for monitoring, detecting and blocking of fraudulent transactions by restricting unauthorized network access by users without credentials; Computer hosted, online and cloud-based computer security services and software as a service for analyzing, and detecting unusual patterns in, user and electronic transaction data including behavioral and contextual data; software as a service featuring software for data security; rental of computer software; providing temporary use of non-downloadable software applications accessible via a web site for data storage and data security; Rental of internet security computer software programs; Computer services, namely, hosting an interactive web site that allows users to assess vulnerabilities regarding fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote e-commerce transactions; online and cloud based services, namely, consultancy services for fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote e-commerce transactions; software as a service for network, application and hardware assessment for fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote e-commerce transactions; Computer services, namely, hosting an interactive web site that allows users to perform risk analysis, including risk analysis of electronic and remote electronic transactions, electronic transaction requests, and user account access requests; online and cloud based services, namely, network, application and hardware analysis for risk analysis, including risk analysis of electronic and remote electronic transactions, electronic transaction requests, and user account access requests; software as a service for risk analysis, including risk analysis of electronic and remote electronic transactions, electronic transaction requests, and user account access requests; Computer services, namely, hosting an online accessible service for analyzing application and network user risk; Computer services, namely, hosting an online accessible service that allows to coordinate and orchestrate authentication and cybersecurity; online and cloud based services, namely, application service provider (ASP) featuring software for coordination and orchestration of authentication and cybersecurity; software as a service featuring software for managing authentication and cybersecurity services; Computer services, namely, hosting an online accessible service that allows to secure electronic and online e-commerce transactions; online and cloud based services, namely, application service provider (ASP) featuring software for securing electronic and e-commerce transactions; software as a service featuring software for securing electronic and e-commerce transactions; Computer services, namely, hosting an online accessible service that allows to record and store a user's approval of an electronic and online e-commerce transaction; online and cloud based services, namely, application service provider (ASP) featuring software for capturing an approval of electronic and e-commerce transactions; software as a service featuring software for recording and storing approval of an electronic and online e-commerce transaction; Computer services, namely, hosting an online accessible service that allows generating and capturing electronic proof of an authorization of an electronic and online ecommerce transactions and documents; online and cloud based services, namely, application service provider (ASP) featuring software for generating and capturing electronic proof of an authorization of an electronic and online ecommerce transactions and documents; software as a service featuring software for generating and storing electronic proof of an authorization of an electronic and online ecommerce transactions and documents; Computer services, namely, hosting an interactive web site that allows users to generate electronic signatures for ecommerce transactions and electronic documents; online and cloud based services, namely, application service provider (ASP) featuring software for users to generate electronic signatures for ecommerce transactions and electronic documents; software as a service featuring software for users to generate electronic signatures for ecommerce transactions and electronic documents; Computer services, namely, hosting an interactive web site that allows for electronically signing electronic and e-commerce transactions; online and cloud based services, namely, application service provider (ASP) featuring software for electronically signing electronic and e-commerce transactions; software as a service featuring software for electronically signing electronic and online e-commerce transactions; Computer services, namely, hosting an interactive web site that allows users to sign electronic documents; online and cloud based services, namely, application service provider (ASP) featuring software for signing electronic documents; software as a service featuring software for signing electronic documents; software as a service featuring software for capturing images of electronic document signatures; computer services, namely, hosting an interactive web site that allows users to electronically send, sign, receive and manage documents as part of an electronic business transaction; online and cloud based services, namely, application service provider (ASP) featuring software to electronically send, sign, receive and manage documents as part of an electronic business transaction; software as a service featuring software to electronically send, sign, receive and manage documents as part of an electronic business transaction; Computer services, namely, hosting an interactive web site that allows users to collect data for ensuring the legal enforceability, regulatory compliance and auditability of documents and business transactions; online and cloud based services, namely, application service provider (ASP) featuring software for ensuring the legal enforceability, regulatory compliance and auditability of documents and business transactions; software as a service featuring data collection software for ensuring the legal enforceability, regulatory compliance and auditability of documents and business transactions; Computer services, namely, hosting an interactive web site that allows users to obtain secure electronic forensic evidence relating to the business transaction process and documents; online and cloud based services, namely, application service provider (ASP) featuring software for obtaining secure electronic forensic evidence relating to the business transaction process and documents; software as a service featuring data collection software for obtaining secure electronic forensic evidence relating to the business transaction process and documents; software as a service featuring software tools for Electronic signature and e-commerce transaction management allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents; Computer services, namely, hosting an online accessible service that allows capturing and storing electronic evidence data, audit trail data, and electronic signature data; online and cloud based services, namely, internet based data capture services for capturing and storing electronic evidence data, audit trail data and electronic signature data; software as a service featuring software for capturing and storing electronic evidence data, audit trail data and electronic signature data; Computer services, namely, hosting an online accessible service that allows capturing and storing electronic evidence data, audit trail data that allows reproducing exactly what a signer saw and did on a website page or electronic document or during an ecommerce transaction; online and cloud based services, namely, application service provider (ASP) featuring software for capturing and storing electronic evidence data, audit trail data that allows reproducing exactly what a signer saw and did on a website page or electronic document or during an ecommerce transaction; software as a service featuring software for capturing and storing electronic evidence data, audit trail data that allows reproducing exactly what a signer saw and did on a website page or electronic document or during an ecommerce transaction; Computer services, namely, hosting an interactive web site that allows for capturing and storing data documenting an electronic signature process; online and cloud based services, namely, application service provider (ASP) featuring software for capturing storing data documenting an electronic signature process; software as a service featuring software for capturing and storing data documenting an electronic signature process; Computer services, namely, hosting an online accessible service that allows for capturing and storing data documenting an electronic signature process; online and cloud based services, namely, application service provider (ASP) featuring software for capturing and storing data documenting an electronic signature process; software as a service featuring software for capturing and storing data documenting an electronic signature process; Computer services, namely, hosting an interactive web site that allows for capturing and storing data documenting electronic delivery of documents and information; online and cloud based services, namely, application service provider (ASP) featuring software for capturing and storing data documenting electronic delivery of documents and information; software as a service featuring software for capturing and storing data documenting electronic delivery of documents and information; Computer services, namely, hosting an online accessible service that allows viewing and reviewing electronic evidence data, audit trail data and reviewing electronic signature data; online and cloud based services, namely, application service provider (ASP) featuring software for viewing and reviewing electronic evidence data, audit trail data and reviewing electronic signature data; software as a service featuring software for viewing and reviewing electronic evidence data, audit trail data and reviewing electronic signature data; Computer services, namely, hosting an interactive web site that allows viewing and reviewing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did in the context of the process of electronically signing the document; online and cloud based services, namely, application service provider (ASP) featuring software for viewing and reviewing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did when electronically signing the document; software as a service featuring software for viewing and reviewing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did on the document; Computer services, namely, hosting an interactive web site that allows viewing and reviewing data documenting an electronic signature process for documents and ecommerce transactions; online and cloud based services, namely, application service provider (ASP) featuring software for viewing and reviewing data documenting an electronic signature process for documents and ecommerce transactions; software as a service featuring software for viewing and reviewing data documenting an electronic signature process for documents and ecommerce transactions; Computer services, namely, hosting an online accessible service that allows viewing and reviewing data documenting electronic delivery of documents and information; online and cloud based services, namely, application service provider (ASP) featuring software for viewing and reviewing data documenting electronic delivery of documents and information; software as a service featuring software for viewing and reviewing data documenting electronic delivery of documents and information; Computer services, namely, hosting an online accessible service that allows for reviewing and verifying electronic forensic evidence data files; online and cloud based services, namely, application service provider (ASP) featuring software for reviewing and verifying electronic forensic evidence data files; software as a service featuring software for reviewing and verifying electronic forensic evidence data files; Computer services, namely, hosting an online accessible service that allows reproducing a record of an electronic authorization and approval process of an electronic transaction and document; online and cloud based services, namely, application service provider (ASP) featuring software for reproducing a record of an electronic authorization and approval process of an electronic transaction and document; software as a service featuring software for reproducing a record of an electronic authorization and approval process of an electronic transaction and document; Computer services, namely, hosting an online accessible service that allows reproducing a record of digital signature for an electronic transaction and document; online and cloud based services, namely, application service provider (ASP) featuring software for reproducing a record of digital signature for an electronic transaction and document; software as a service featuring software for reproducing a record of digital signature for an electronic transaction and document; Computer services, namely, hosting an online accessible service that creates a digital record and automation of business processes, namely, adding new customer information to a database; software as a service featuring software for creating a digital record and automation of business processes, namely, adding new customer information to a database; Services for the secure digital storage of electronic documents; Information, advice and consultancy relating to the aforesaid services, whether or not via the Internet; Computer technology consultancy; technical consultancy in the field of information and communication technology (ICT); Consultancy in the field of cyber security, internet security, computer security, computer network security, data security, data cryptography, electronic signature verification services using technology to authenticate user identity, electronic signature verification services using technology to authenticate user identity for electronically signing documents, and using data cryptography for making secure data transmissions and bank transactions via computer networks and telecommunication networks; consultancy in the field of software and technology for electronic document management; Quality control for others provided by computer professionals in the field of security and certification of telecommunications; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability of telecommunications; cyber security vulnerability testing, namely, computer security consultancy in the field of penetration testing of computers and networks to assess information security vulnerability; vulnerability testing and security testing of electronic systems, computer systems, computer based applications, remotely accessible applications, computer software, sever software and mobile application software, namely, computer security consultancy in the field of penetration testing of computers, software and networks to assess information security vulnerability; Consultancy in the field of fraud detection, risk detection, risk management, fraud analysis and fraud prevention, in the field of electronic, digital, online and remote e-commerce transactions, namely, electronic monitoring of electronic, digital or online transactions to detect fraud via the internet; Computer programming and software customization of data processing equipment; computer Software research; conducting computer software research studies; Design, development, customization, installation, updating and maintenance of computer software; computer programming; technical research in the fields of cyber security, authentication and electronic signatures; scientific research; development of software for managing and providing access to electronic documents, database archives and digital documentation records; Design, development, customization, installation, updating and maintenance of software; Designing, developing, customizing, installing, updating and maintaining computer software in the field of cyber security, internet security, computer security, computer network security, data security, cryptography of digital files, Electronic signature and credential verification services using technology to authenticate user identity and electronic transactions, verification services for electronically signing documents, and making secure data transmissions and banking transactions via computer networks and telecommunication networks; Computer programming services for electronic data security; design and development of electronic data security systems; computer programming of internet security programs; design and development of internet security programs; Design, development, customization, installation, updating and maintenance of computer software relating to computer security and prevention of computer security risks; designing, updating and maintaining computer software of others used for computer network security; Designing, developing, updating and maintaining computer software in the field of electronic document management; Research in the field of computer network security; technical research relating to automatic identification and authentication systems to identify and authenticate users of computer network systems and software; Computer security services for securing remote communication and providing secure network communications, providing secure and authenticated user access to computer networks and websites, providing secure and authenticated user access to computer networks, web sites on computer networks, electronically accessible applications in data networks and computer applications in data networks, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; data security consultancy concerning securing telecommunication for secure data transfer via telecommunications; all the aforementioned services to the exception of scientific and technological services and research and design relating thereto, industrial analysis and research services, design and development of computer hardware and software, development of verification software, licensing of computer software, in particular formal verification (this does not include personal identity verification and authentication) software, providing of computer software technical support services, application engineering; all of the aforementioned exceptions only for formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking purposes, in particular in the field of semiconductor production development, production and distribution of software for the formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking of semiconductors and other technical components as well as the provision of any related services;
TRUCKPAY Truckpay Inc. 15 Central Avenue Tenafly NJ 07670 Mobile application software for automating logistics in the construction industry and for enabling the auctioning of construction jobs by construction companies and subcontractors; Downloadable computer software for automating logistics in the construction industry and for enabling the auctioning of construction jobs by construction companies and subcontractors;TRUCK PAY;Providing a website featuring non-downloadable software for automating logistics in the construction industry and enabling the auctioning of construction jobs by construction companies and subcontractors; Software as a service (SAAS) services featuring software for automating logistics in the construction industry and enabling the auctioning of construction jobs by construction companies and subcontractors;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A techinque for communicating with a mobile data processing device by way of a mobile software agent. Any application, such as a banking application which permits cash withdrawals from ATMs, can be represented as a mobile software agent. The mobile software agent is spread across a network to all terminals with cash dispensing functions. The terminals include a communication component having a mobile software agent interface function component and a mobile chipcard interface function component. The mobile software agent interface component provides support functions for receiving and installing the mobile software agent. The chipcard interface component safeguards the communication with the chipcard. The mobile software agent evaluates the information delivered to it from the mobile software agent interface component and then installs itself on the terminals as appropriate. Chipcard-related events are notified via the chipcard interface component to the mobile software agent which, after classifying the chipcard concerned, performs the actions on the chipcard. By implementating these interface components on every terminal in the network, administration of the chipcards in the network can be controlled from the backend system (server).