COMPUTER SOFTWARE AUTHORIZATION

Brand Owner (click to sort) Address Description
PASSPORT AUTHORIZATION PRODUCT Diversinet Corp. 2225 Sheppard Avenue, E., Suite 1700 Toronto, Ontario M2J 5C2 Canada COMPUTER SOFTWARE FOR AUTHORIZATION OF DIGITAL COMMUNICATIONS AND ELECTRONIC COMMERCE OVER CORPORATE NETWORKS, TELECOMMUNICATIONS SYSTEMS, THE INTERNET, INTRANETS AND EXTRANETS;PASS PORT AUTHORIZATION PRODUCT;
TRUSTEDSHOW TRUSTED LOGIC MOBILITY 6 Rue de la Verrerie F-92190 MEUDON France Computer software for the authorization, downloading, transmitting, receiving, retrieving, encoding, decoding of data, images, audio files, video files and electronic games; computer software for identifying, positioning, grouping together, distributing and managing data and links between computer servers and users connected to electronic communications networks; software for securing digital rights management (DRM) agents used in connection with electronic goods, namely, cellular telephones, personal digital assistants, wireless-local-area-network (WLAN) goods in the nature of wireless communication devices for radio transmission and close-range wireless communication goods in the nature of wireless communication devices for voice, data or image transmission;TRUSTED SHOW;Color is not claimed as a feature of the mark.;Technical support, namely, trouble shooting problems of computer software integrated into electronic goods, namely, cellular telephones, personal digital assistants, wireless-local-area-network (WLAN) goods in the nature of wireless radio transmission and close-range wireless communication goods in the nature of wireless communication devices for voice, data, image transmission; maintenance and updating of software integrated into electronics goods, namely, cellular telephones, personal digital assistants, wireless-local-area-network (WLAN) goods in the nature of wireless radio transmission and close-range wireless communication goods in the nature of wireless communication devices for voice, data, image transmission; consulting on securing and design of software for securing digital rights management (DRM) agents with respect to electronic goods, namely, cellular telephones, personal digital assistants, wireless-local-area-network (WLAN) goods in the nature of wireless radio transmission and close-range wireless communication goods in the nature of wireless communication devices for voice, data, image transmission; services included in this class, namely, computer software consulting, creating, maintaining and modernizing computer software;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Described is a method and system for controlling usage of software on a computing device. An authorization key is generated as a function of a device string and a software string. The device string is a unique string stored in the device. The software string is a unique string stored in a software authorized for use on the device. The authorization key is encrypted using a private key and stored in the device. Upon a request to use software on the device, the authorization key is decrypted using a public key corresponding to the private key. A test key is generated as a function of the device string and a request software string. The request software string is a unique string stored in the software for which use has been requested. The authorization key is compared to the test key. When the test key matches the authorization key, usage of the software for which use has been requested on the device is permitted.