SECUREAUTH CORPORATION

 SECUREAUTH CORPORATION contact information is shown below
Owner:SECUREAUTH CORPORATION
Owner Address:38 Discover, Suite 100 Irvine CA 92618
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned bySECUREAUTH CORPORATION

Brand:

ACCEPTTO

Description:

Computer software, firmware, and hardware for providing access control notification, authentication, authorization, and risk management based on identity proofing via cognitive authentication using biometric, contextual, and behavioral verifications via a global computer network and mobile devices;Computer security services, namely, enforcing, restricting, and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Providing user authentication services using biometric hardware and software technology for financial transactions, data access, and secure entry and exit door access to authenticate users and enforce and control access privileges of users;

Category: COMPUTER SOFTWARE
Brand:

ARCULIX

Description:

SOFTWARE TO ALLOW USERS TO PERFORM ELECTRONIC BUSINESS TRANSACTIONS VIA A GLOBAL COMPUTER NETWORK; SOFTWARE FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT IN BUSINESS TO BUSINESS, BUSINESS TO ENTERPRISE AND BUSINESS TO CONSUMER APPLICATIONS, AND FOR PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DEVICES, DIGITAL IDENTITIES AND DIGITAL CERTIFICATES FOR WEB-BASED SOFTWARE APPLICATIONS FOR COMPUTERS AND MOBILE COMPUTING DEVICES; SOFTWARE FOR PROVIDING IDENTITY AND INFORMATION SECURITY SOLUTIONS FOR CLOUD, MOBILE, WEB AND VPN SYSTEMS; SOFTWARE FOR PROVIDING IDENTITY-BASED SECURITY AUTOMATION SOLUTIONS; SOFTWARE FOR PROVIDING IDENTITY AND ACCESS MANAGEMENT SOLUTIONS; SOFTWARE FOR PROVIDING MULTI-FACTOR AUTHENTICATION AND MODERN ADAPTIVE AUTHENTICATION SOLUTIONS; SOFTWARE FOR PROVIDING CONTINUOUS AUTHENTICATION; SOFTWARE FOR PROVIDING PASSWORDLESS AUTHENTICATION; SOFTWARE FOR PROVIDING SINGLE SIGN-ON SOLUTIONS; SOFTWARE FOR ENFORCING, RESTRICTING AND CONTROLLING ACCESS PRIVILEGES OF USERS OF COMPUTING RESOURCES FOR CLOUD, MOBILE, OR NETWORK RESOURCES BASED ON ASSIGNED CREDENTIALS; SOFTWARE FOR PROVIDING USER AUTHENTICATION SERVICES USING SINGLE SIGN-ON TECHNOLOGY FOR ONLINE SOFTWARE APPLICATIONS; SOFTWARE FOR PROVIDING USER AUTHENTICATION SERVICES USING BIOMETRIC HARDWARE, BEHAVIORAL BIOMETRICS AND SOFTWARE TECHNOLOGY FOR E-COMMERCE TRANSACTIONS AND IDENTITY AND ACCESS MANAGEMENT; SOFTWARE FOR RESTRICTING UNAUTHORIZED / / ACCESS TO HARD DRIVES, COMPUTER NETWORKS, WEBSITES; SOFTWARE FOR RESTRICTING UNAUTHORIZED / / SYSTEM AND NETWORK ACCESS BY VALIDATING CREDENTIALS; SOFTWARE FOR PROVIDING AUTHENTICATION, ISSUANCE, VALIDATION AND REVOCATION OF DIGITAL CERTIFICATE; SOFTWARE FOR USE TO ACCESS, COLLECT AND MODIFY NETWORK USER IDENTIFICATION; SOFTWARE FOR WORKFLOW, HELPDESK AND NETWORK SECURITY MANAGEMENT; SOFTWARE FOR USE TO AUTOMATE PASSWORD MANAGEMENT ALLOWING USERS TO SECURELY RESET AND SYNCHRONIZE PASSWORDS ACROSS MULTIPLE APPLICATIONS, THE INTERNET, AND LOCAL, WIDE AREA AND OTHER GLOBAL COMPUTER NETWORKS; SOFTWARE FOR AUTOMATING AND MANAGING SECURITY POLICY ADMINISTRATION, ENFORCEMENT, AND COMPLIANCE FOR USERS OF SOFTWARE APPLICATIONS; COMPUTER SECURITY SOFTWARE, namely, SOFTWARE FOR ENCRYPTING AND PROTECTING THE INTEGRITY OF DATA AND ELECTRONIC COMMUNICATIONS OVER COMPUTER NETWORKS; COMPUTER SOFTWARE FOR AUTHENTICATION, ACCESS CONTROL AND OTHER SECURITY FEATURES WITHIN COMPUTER NETWORKS AND THROUGH EXTERNAL CONNECTIONS; COMPUTER SOFTWARE FOR IMPLEMENTING SECURITY METHODOLOGY INVOLVING ENCRYPTION OF PAYMENT CARD NUMBERS OVER A GLOBAL COMPUTER NETWORK; COMPUTER SOFTWARE FOR USE TO COMPILE, MANAGE, ENCRYPT AND STORE PERSONAL INFORMATION; COMPUTER SOFTWARE FOR USE TO ACCESS, COLLECT AND MODIFY NETWORK USER IDENTIFICATION; COMPUTER SOFTWARE FOR WORKFLOW, HELPDESK AND NETWORK SECURITY MANAGEMENT; COMPUTER SOFTWARE FOR USE TO AUTOMATE PASSWORD MANAGEMENT ALLOWING USERS TO SECURELY RESET AND SYNCHRONIZE PASSWORDS ACROSS MULTIPLE APPLICATIONS, THE INTERNET, AND LOCAL, WIDE AREA AND OTHER GLOBAL COMPUTER NETWORKS; COMPUTER SOFTWARE TO ENABLE USERS OF OTHER COMPUTER PRODUCTS TO CONNECT TO AND USE CUSTOMER HELP AND SUPPORT FUNCTIONS ACROSS MULTIPLE APPLICATIONS, THE INTERNET, AND LOCAL, WIDE AREA AND OTHER GLOBAL COMPUTER NETWORKS; COMPUTER SOFTWARE, namely, IDENTIFICATION MANAGEMENT SOFTWARE FOR DEFINING, MANAGING, ESTABLISHING AND ASSIGNING SETS OF USERS' ACCESS RIGHTS TO APPLICATIONS, DATA, AND NETWORKS; COMPUTER SOFTWARE FOR REGISTERING AND AUTHENTICATING DIGITAL CERTIFICATES; COMPUTER SOFTWARE FOR ACCESSING, CREATING AND MODIFYING NETWORK USER IDENTIFICATION INFORMATION; AND COMPUTER SOFTWARE WHICH ENABLES USERS OF OTHER COMPUTER PRODUCTS TO ACCESS AND USE CUSTOMER HELP AND CUSTOMER SUPPORT FUNCTIONS;COMPUTER SECURITY SERVICES, namely, RESTRICTING ACCESS TO AND BY COMPUTER NETWORKS AND RESOURCES; SOFTWARE AS A SERVICES (SAAS) SERVICES FEATURING SOFTWARE, FOR IDENTITY-BASED SECURITY AUTOMATION SOLUTIONS, FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT, AND FOR PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DEVICES, DIGITAL IDENTITIES AND DIGITAL CERTIFICATES; PROVIDING IDENTITY AND INFORMATION SECURITY SOLUTIONS FOR CLOUD, MOBILE, WEB AND VPN SYSTEMS IN THE NATURE OF ELECTRONIC SIGNATURE VERIFICATION AND LOGON SERVICES USING TECHNOLOGY TO AUTHENTICATE USER IDENTITY, USER ACCESS REQUEST MANAGEMENT, AUTOMATION OF THE CREATION AND MANAGEMENT OF USER ACCOUNTS AND ACCESS RIGHTS, AND ROLE-BASED ACCESS CONTROL PROGRAMS; PROVIDING IDENTITY-BASED SECURITY AUTOMATION SOLUTION SERVICES, namely, ELECTRONIC MONITORING OF PERSONALLY IDENTIFYING INFORMATION TO DETECT IDENTITY THEFT VIA THE INTERNET; PROVIDING IDENTITY AND ACCESS MANAGEMENT SOLUTION SERVICES, namely, PROVIDING USER AUTHENTICATION SERVICES USING BIOMETRIC HARDWARE AND SOFTWARE TECHNOLOGY FOR E-COMMERCE TRANSACTIONS; PROVIDING MULTI-FACTOR AUTHENTICATION AND MODERN ADAPTIVE AUTHENTICATION SOLUTION SERVICES, namely, PROVIDING USER AUTHENTICATION SERVICES USING SINGLE SIGN-ON TECHNOLOGY FOR ONLINE SOFTWARE APPLICATIONS; PROVIDING USER AUTHENTICATION SERVICES USING SINGLE SIGN-ON TECHNOLOGY FOR ONLINE SOFTWARE APPLICATIONS; SOFTWARE AS A SERVICES (SAAS) SERVICES FEATURING SOFTWARE FOR PROVIDING IDENTITY AND INFORMATION SECURITY SOLUTIONS FOR CLOUD, MOBILE, WEB AND VPN SYSTEMS, IDENTITY-BASED SECURITY AUTOMATION, IDENTITY AND ACCESS MANAGEMENT, MULTI-FACTOR AUTHENTICATION, PROVIDING CONTINUOUS AUTHENTICATION, PASSWORDLESS AUTHENTICATION AND MODERN ADAPTIVE AUTHENTICATION, AND NETWORK SECURITY SERVICES; SOFTWARE AS A SERVICES (SAAS) SERVICES FEATURING SOFTWARE FOR ENFORCING, RESTRICTING AND CONTROLLING ACCESS PRIVILEGES OF USERS OF COMPUTING RESOURCES FOR CLOUD, MOBILE, OR NETWORK RESOURCES BASED ON ASSIGNED CREDENTIALS; COMPUTER SECURITY SERVICES, namely, ENFORCING, RESTRICTING AND CONTROLLING ACCESS PRIVILEGES OF USERS OF COMPUTING RESOURCES FOR CLOUD, MOBILE, OR NETWORK RESOURCES BASED ON ASSIGNED CREDENTIALS; SOFTWARE AS A SERVICE (SAAS) SERVICES FEATURING SOFTWARE FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT IN BUSINESS TO BUSINESS, BUSINESS TO ENTERPRISE AND BUSINESS TO CONSUMER APPLICATIONS, AND FOR ENFORCING, RESTRICTING AND CONTROLLING ACCESS PRIVILEGES OF USERS OF COMPUTING RESOURCES FOR CLOUD, MOBILE, OR NETWORK RESOURCES BASED ON ASSIGNED CREDENTIALS; PLATFORM AS A SERVICE (PAAS) SERVICES FEATURING COMPUTER SOFTWARE PLATFORMS FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT IN BUSINESS TO BUSINESS, BUSINESS TO ENTERPRISE AND BUSINESS TO CONSUMER APPLICATIONS, AND FOR ENFORCING, RESTRICTING AND CONTROLLING ACCESS PRIVILEGES OF USERS OF COMPUTING RESOURCES FOR CLOUD, MOBILE, OR NETWORK RESOURCES BASED ON ASSIGNED CREDENTIALS; APPLICATION SERVICE PROVIDER (ASP) FEATURING SOFTWARE FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT IN BUSINESS TO BUSINESS, BUSINESS TO ENTERPRISE AND BUSINESS TO CONSUMER APPLICATIONS, AND FOR ENFORCING, RESTRICTING AND CONTROLLING ACCESS PRIVILEGES OF USERS OF COMPUTING RESOURCES FOR CLOUD, MOBILE, OR NETWORK RESOURCES BASED ON ASSIGNED CREDENTIALS; COMPUTER SECURITY SERVICES IN THE NATURE OF ACCESS PRIVILEGE ENFORCEMENT SERVICES, namely, VALIDATING THE IDENTITY AND ACCESS PRIVILEGES OF USERS OR PERSONNEL PRIOR TO ACCESSING COMPUTERS, COMPUTER NETWORKS, OR OTHER COMPUTER RESOURCES; PROVIDING USER AUTHENTICATION SERVICES IN E-COMMERCE TRANSACTIONS; PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DEVICES, DIGITAL IDENTITY AND DIGITAL CERTIFICATES FOR WEB-BASED SOFTWARE APPLICATIONS FOR COMPUTERS AND MOBILE COMPUTING DEVICES; PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DIGITAL IDENTITY CERTIFICATES FOR WEB-CONNECTED NETWORK SYSTEMS, RESOURCES, AND CONTROLS; PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DIGITAL IDENTITY CERTIFICATES FOR NETWORKED SECURITY PROCESSES SUCH AS PASSWORDS, USER MANAGEMENT, AND HELP DESK MANAGEMENT UTILITIES; PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DIGITAL IDENTITY CERTIFICATES FOR WEB-CONNECTED NETWORK SYSTEM USERS; COMPUTER SECURITY SERVICES IN THE NATURE OF PROVIDING AUTHENTICATION, ISSUANCE, VALIDATION AND REVOCATION OF DIGITAL CERTIFICATES; IDENTIFICATION VERIFICATION SERVICES, namely, ELECTRONIC DOCUMENT AND E-MAIL AUTHENTICATION SERVICES SIGN-ON AND LOGIN AUTHENTICATION SERVICES; IDENTIFICATION VERIFICATION SERVICES, namely, PROVIDING AUTHENTICATION OF PERSONAL IDENTIFICATION INFORMATION IN THE NATURE OF VALIDATION OF DIGITAL CERTIFICATES FROM SECURE STORAGE AND TRANSMITTING SUCH INFORMATION VIA THE INTERNET; COMPUTER SERVICES, namely, FOR AUTHENTICATION, ISSUANCE AND VALIDATION OF DIGITAL CERTIFICATES; COMPUTER SECURITY SERVICES, namely, FOR THREAT ANALYSIS FOR PROTECTING DATA; SOFTWARE AS A SERVICE (SAAS) SERVICES FEATURING SOFTWARE FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT IN BUSINESS TO BUSINESS, BUSINESS TO ENTERPRISE AND BUSINESS TO CONSUMER APPLICATIONS, AND FOR PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DIGITAL IDENTITY CERTIFICATES FOR WEB-BASED SOFTWARE APPLICATIONS FOR COMPUTERS AND MOBILE COMPUTING DEVICES; PLATFORM AS A SERVICE (PAAS) SERVICES FEATURING COMPUTER SOFTWARE PLATFORMS FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT IN BUSINESS TO BUSINESS, BUSINESS TO ENTERPRISE AND BUSINESS TO CONSUMER APPLICATIONS, AND FOR PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DIGITAL IDENTITY CERTIFICATES FOR WEB-BASED SOFTWARE APPLICATIONS FOR COMPUTERS AND MOBILE COMPUTING DEVICES; APPLICATION SERVICE PROVIDER (ASP) SERVICES FEATURING SOFTWARE FOR USE IN ACCESS CONTROL AND IDENTITY MANAGEMENT IN BUSINESS TO BUSINESS, BUSINESS TO ENTERPRISE AND BUSINESS TO CONSUMER APPLICATIONS, AND FOR PROVIDING AUTHENTICATION, ISSUANCE, AND VALIDATION OF DIGITAL IDENTITY CERTIFICATES FOR WEB-BASED SOFTWARE APPLICATIONS FOR COMPUTERS AND MOBILE COMPUTING DEVICES; COMPUTER SECURITY SERVICES IN THE NATURE OF PROVIDING AUTHENTICATION, ISSUANCE, VALIDATION AND REVOCATION OF DIGITAL CERTIFICATES; PROVIDING USER AUTHENTICATION SERVICES USING SINGLE SIGN-ON TECHNOLOGY FOR ONLINE SOFTWARE APPLICATIONS; PROVIDING USER AUTHENTICATION SERVICES USING BEHAVIORAL BIOMETRICS, BIOMETRIC HARDWARE AND SOFTWARE TECHNOLOGY FOR E-COMMERCE TRANSACTIONS AND IDENTITY AND ACCESS MANAGEMENT; COMPUTER SECURITY SERVICES IN THE NATURE OF ADMINISTERING DIGITAL KEYS; COMPUTER SECURITY SERVICES, namely, RESTRICTING UNAUTHORIZED / / ACCESS TO HARD DRIVES, COMPUTER NETWORKS, WEBSITES; DATA ENCRYPTION SERVICES; COMPUTER SECURITY SERVICES, namely, RESTRICTING UNAUTHORIZED / / NETWORK ACCESS BY VALIDATING CREDENTIALS; COMPUTER CONSULTATION SERVICES INVOLVING THE CREATION AND DEVELOPMENT OF COMPUTER SECURITY SOFTWARE PROGRAMS FOR OTHERS AND SECURITY PRINTING, namely, ENCODING IDENTIFICATION INFORMATION, NON-VALUABLE DOCUMENTS AND PRODUCTS; SOFTWARE AS A SERVICE (SAAS) SERVICES FEATURING SOFTWARE FOR USE IN WORKFLOW, HELPDESK AND NETWORK SECURITY MANAGEMENT; SOFTWARE AS A SERVICE (SAAS) SERVICES FEATURING SOFTWARE FOR USE TO AUTOMATE PASSWORD MANAGEMENT ALLOWING USERS TO SECURELY RESET AND SYNCHRONIZE PASSWORDS ACROSS MULTIPLE APPLICATIONS, THE INTERNET, AND LOCAL, WIDE AREA AND OTHER GLOBAL COMPUTER NETWORKS; SOFTWARE AS A SERVICE (SAAS) SERVICES, namely, HOSTING SOFTWARE FOR USE BY OTHERS FOR USE TO COMPILE, MANAGE, ENCRYPT AND STORE PERSONAL INFORMATION; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR USE TO ACCESS, COLLECT AND MODIFY NETWORK USER IDENTIFICATION; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR WORKFLOW, HELPDESK AND NETWORK SECURITY MANAGEMENT; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR USE TO AUTOMATE PASSWORD MANAGEMENT ALLOWING USERS TO SECURELY RESET AND SYNCHRONIZE PASSWORDS ACROSS MULTIPLE APPLICATIONS, THE INTERNET, AND LOCAL, WIDE AREA AND OTHER GLOBAL COMPUTER NETWORKS; PROVIDING WEBSITE SERVICES FEATURING TECHNOLOGY THAT TO ENABLE USERS OF OTHER COMPUTER PRODUCTS TO CONNECT TO AND USE CUSTOMER HELP AND SUPPORT FUNCTIONS ACROSS MULTIPLE APPLICATIONS, THE INTERNET, AND LOCAL, WIDE AREA AND OTHER GLOBAL COMPUTER NETWORKS; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR AUTOMATING AND MANAGING SECURITY POLICY ADMINISTRATION, ENFORCEMENT, AND COMPLIANCE FOR USERS OF SOFTWARE APPLICATIONS; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE, namely, IDENTIFICATION MANAGEMENT SOFTWARE FOR DEFINING, MANAGING, ESTABLISHING AND ASSIGNING SETS OF USERS' ACCESS RIGHTS TO APPLICATIONS, DATA, AND NETWORKS; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR REGISTERING AND AUTHENTICATING DIGITAL CERTIFICATES; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR ACCESSING, CREATING AND MODIFYING NETWORK USER IDENTIFICATION INFORMATION; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE FOR WORKFLOW MANAGEMENT, HELP DESK MANAGEMENT, AND NETWORK SECURITY; PROVIDING TEMPORARY USE OF ONLINE NON-DOWNLOADABLE COMPUTER SOFTWARE WHICH PROVIDES ANALYSIS OF DATA BEING ACCESSED WITHIN A NETWORK; PROVIDING SOFTWARE AS A SERVICE (SAAS) SERVICES FEATURING SOFTWARE FOR THE UPDATE, INSTALLATION AND MAINTENANCE OF COMPUTER SECURITY SOFTWARE; PROVIDING ONLINE NON-DOWNLOADABLE CLOUD-BASED SECURITY SOFTWARE FOR THREAT ANALYSIS FOR PROTECTING DATA; MONITORING COMPUTER TERMINALS, SERVERS, NETWORKS AND END POINTS DIRECTED TOWARD THE DETECTION OR OTHER ACTION WITH RESPECT TO SECURITY EXPLOITS AND INFORMATION SECURITY VULNERABILITY; AND COMPUTER NETWORK SECURITY SERVICES AND COMMUNICATIONS NETWORK SECURITY SERVICES IN THE NATURE OF RESTRICTING UNAUTHORIZED / NETWORK ACCESS BY NETWORK INTRUSION PROTECTION MANAGING ENDPOINT SECURITY ON NETWORKS, DATA BREACH THREAT ANALYSIS, VULNERABILITY ANALYSIS, AND NETWORK THREAT ANALYSIS, COMPUTER INCIDENT RESPONSE, NETWORK INCIDENT RESPONSE, AND FORENSICS AND PENETRATION TESTING;

Category: SOFTWARE ALLOW USERS
Brand:

ASSERT YOUR IDENTITY

Description:

Providing user authentication services in e-commerce transactions;

Category: PROVIDING USER AUTHENTICATION SERVICES
Brand:

BIOBEHAVIORAL

Description:

Computer hardware and software, for use with medical patient monitoring equipment, for receiving, processing, transmitting and displaying data; Computer software, namely, electronic financial platform that accommodates multiple types of payment and debt transactions in an integrated mobile phone, PDA, and web based environment; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Electronically encoded identity wristbands; Facilities management software, namely, software to control building environment, access and security systems; Subscribed identity module (SIM) cards for cellular telephones;BIO BEHAVIORAL; BIOTECHNOLOGY BEHAVIORAL; BIOLOGY BEHAVIORAL; BIOLOGICAL BEHAVIORAL; BIOTECHNOLOGICAL BEHAVIORAL;

Category: COMPUTER HARDWARE SOFTWARE
Brand:

COGNITIVE AUTHENTICATION

Description:

Providing financial risk management services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network;

Category: PROVIDING FINANCIAL RISK MANAGEMENT SERVICES
Brand:

COGNITIVE CONTINUOUS AUTHENTICATION

Description:

Providing financial risk management services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network;

Category: PROVIDING FINANCIAL RISK MANAGEMENT SERVICES
Brand:

CONTINUOUS BEHAVIORAL AUTHENTICATION

Description:

Computer security services, namely, enforcing, restricting and controlling access to cloud, mobile, Internet of Things (IoT), or network resources by means of authentication technology that continuously authenticates a user's identity based on contextual and behavioral data; Providing verification services, namely, user authentication services, utilizing software and biometric hardware for financial transactions, data access or secure entry by means of authentication technology that continuously authetnicates a user's identity based on contextual and behavioral data;

Category: COMPUTER SECURITY SERVICES
Brand:

EGUARDIAN

Description:

Communication software for providing access to the Internet; communications software for connecting computer network users on any intranet and internet to personal devices and allowing secure transaction authorization via authorized users and machines; computer application software for transaction authorization using any electronic device, discrete or embedded, namely, electronic smart tattoos, implanted electronics in the nature of a biometric identification apparatus, and handheld devices in the nature of mobile phones, wearable electronics, namely, smart rings, smart glasses, smart watches, and traditional computing devices, namely, personal computers, notebooks, tablet computers, phones, netbooks; other portable computers, computer peripherals; personal digital assistants; embedded computing and communication devices, namely, wearable digital electronics devices comprised primarily of software and display screens for viewing, sending and receiving texts, emails, data and information from smart phones, tablet computers and portable computers and also featuring a wristwatch, lapel pin or wristband; computer and telecommunications networking hardware and software for monitoring and alerting remote sensor status via the Internet; computer, Internet and Intranet servers; computer network adapters, switches, routers and hubs; wireless and wired modems and communication cards and devices, namely, encoded identity cards and wireless communication devices for voice, data or image transmission; appliances and consumer electronic devices, namely, televisions, digital music players, mp3 players, stereos, cd players, audio and video recorders, DVD burners, DVD players, DVD recorders, creators in the nature of DVD drives, DVD burners, personal digital devices in the nature of personal digital assistants, VCR's, digital cameras and digital video recorders, cellular phones, home theater products in the nature of LCD, video game programs, audio drivers, video drivers, video cameras; software for monitoring, authorizing cyber transactions for intranet and internet transactions and aggregating transactions and associated response by authorized approvers; computer communications software to allow customers to access bank account information and transact bank business; computer software and hardware for providing peace of mind to users and businesses enabling security as a service (SECaaS) to protect identity of users and ensure security and integrity of their transactions in private, financial, health, information technology, email services and general business transactions by putting users in control of policies and protecting them against cybercrime;Communication services, namely, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks; wireless digital messaging services; wireless electronic transmission of data; telecommunication services, namely, voice, data, graphics and video by means of wireless communication networks; electronic transmission for others of securities and financial information via computer linking services, namely, communicating and routing trade information involving orders, entry and execution services, to others via a global computer network, worldwide switched text and message transmission services;ELECTRONIC GUARDIAN;[ Wearable digital electronic devices comprised primarily of a wristwatch or lapel pin and also featuring computer firmware and operating system software for viewing, sending and receiving texts, emails, data and information from smart phones, tablet computers and portable computers ];Color is not claimed as a feature of the mark.;Electronic signature verification services provided in connection with banking and financial services;Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates for intranet and Internet transactions;Scientific and technological services, namely, research and design in the field of secure and private transaction using multifactor authentication techniques including contextual and biometrics as part of policy orchestration for secure transaction authorization by authorized users and machines; software as a service (SaaS) services featuring software for trust elevation and security of online transactions; software application development services; security as a service (SECaaS) for Intranet and Internet transactions, namely, online scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; providing virtual computer systems and virtual computer environments through cloud computing; online content management services via the Internet, namely, monitoring, testing, analyzing and reporting on the content control of the websites of others for quality control purposes; providing a web hosting platform for use of software for enabling, facilitating or enhancing interactive transaction history and data for business and consumers;

Category: COMMUNICATION SOFTWARE PROVIDING ACCESS
Brand:

ELIMINATE PREVENTABLE HARM

Description:

Computer software, firmware, and hardware for providing access control notification, authentication, authorization and risk management based on identity proofing via cognitive authentication using contextual and behavioral verifications via a global computer network and mobile devices;

Category: COMPUTER SOFTWARE
Brand:

FRICTIONLESS

Description:

Computer software, firmware, and hardware for providing access control notification, authentication, authorization, and risk management based on identity proofing via cognitive authentication including identify proofing using contextual and behavioral verifications via a global computer network and mobile devices;

Category: COMPUTER SOFTWARE
Brand:

I'MHERE

Description:

I AM HERE;Computer security services, namely, enforcing, restricting, and controlling network access permissions based on on the behavior of users of computing resources for cloud, mobile, Internet of Things (IoT) and network resources;

Category: