AGILE TRUST

Brand Owner Address Description
AGILETRUST Cummings Engineering Consultants, Incorporated 9180 S. Kyrene Rd. Suite 109 ATTENTION: SAIFE, Inc. (LEGAL) Tempe AZ 85284 AGILE TRUST;Color is not claimed as a feature of the mark.;Computer hardware and software consulting services; Computer services, namely, acting as an application service provider in the field of information management to host computer application software for the purpose of cryptographic systems; Computer services, namely, remote and on-site management of cryptographic systems of others; Computer software development in the field of cryptographic systems; Computer software development, computer programming and maintenance of computer software for cryptographic systems; Consulting services in the field of the design of cryptographic systems; Design and development of computer software for cryptographic systems; Design and development of software and hardware for cryptographic systems; Design for others in the field of cryptographic systems; Design, development, and consulting services related thereto in the field of cryptographic systems; Design, development, and implementation of software for cryptographic systems; Installation and maintenance of cryptographic system software; Installation of cryptographic system software; Installation, maintenance and repair of cryptographic system software; Maintenance of computer software used for cryptographic systems; Platform as a service (PAAS) featuring computer software platforms for operating and managing cryptographic systems; Providing on-line non-downloadable software for operating and managing cryptographic systems; Providing temporary use of on-line non-downloadable software for operating and managing cryptographic systems; Software as a service (SAAS) services featuring software for operating and managing cryptographic systems; Software development and product development consulting in the field of cryptographic systems; Software development consulting in the field of cryptographic systems; Software development in the field of cryptographic systems; Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of cryptographic systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The present invention relates to establishing security within an ad hoc network. Such ad hoc networks do not have on-line connections to a particular server for getting desired public keys or certificates, thereby requiring them to create trust relations among their respective nodes wherein some of the nodes have a mutual trust relation to each other, thus constituting a trust group. When a particular candidate node desires to join the trust group, an X-node is identified, being a member of a trust group and having a trust relation with the candidate node. The X-node then certifies the candidate node and establishes and distributes trust relations between the members of the trust group and the candidate node.