COMPUTER SOFTWARE FACILITATING TRUSTED

Brand Owner (click to sort) Address Description
RIVET Rivetz Corp. 1209 Orange Street Wilmington DE 19801 Computer software for facilitating trusted computing; computer software for managing access to a private key; computer software for facilitating storing a private key; computer software managing a private key in a computer network computer software to enable hardware protection of a user's private keys; ; computer software for protecting private keys, including crypto currency private keys; computer software to facilitate a trusted execution environment (TEE); application program interface (API) software for device identification; computer software to facilitate secure transactions via computer and communication networks, including in the fields of banking, Bitcoin transactions, private messaging, and mobile applications; computer software, namely, software for authentication; computer software for authenticating computing devices, including mobile devices; computer software and hardware for security; computer software for use in safeguarding access to digital content, including cryptocurrency, audio, video, text, and multimedia files; computer software to facilitate authentication of an authorized device or user of a computer system;
RIVETZ Rivetz Corp. 1209 Orange Street Wilmington DE 19801 Computer software for facilitating trusted computing; computer software for managing access to a private key; computer software for facilitating storing a private key; computer software managing a private key in a computer network computer software to enable hardware protection of a user's private keys; computer software for protecting private keys, including crypto currency private keys; computer software to facilitate a trusted execution environment (TEE); application program interface (API) software for device identification; computer software to facilitate secure transactions via computer and communication networks, including in the fields of banking, Bitcoin transactions, private messaging, and mobile applications; computer software, namely, software for authentication; computer software for authenticating computing devices, including mobile devices; computer software and hardware for security; computer software for use in safeguarding access to digital content, including cryptocurrency, audio, video, text, and multimedia files; computer software to facilitate authentication of an authorized device or user of a computer system;
RVT Rivetz Corp. 1209 Orange Street Wilmington DE 19801 Computer software for facilitating trusted computing; computer software for managing access to a private key; computer software for facilitating storing a private key; computer software managing a private key in a computer network computer software to enable hardware protection of a user's private keys; computer software for protecting private keys, including crypto currency private keys; computer software to facilitate a trusted execution environment (TEE); application program interface (API) software for device identification; computer software to facilitate secure transactions via computer and communication networks, including in the fields of banking, Bitcoin transactions, private messaging, and mobile applications; computer software, namely, software for authentication; computer software for authenticating computing devices, including mobile devices; computer software and hardware for security; computer software for use in safeguarding access to digital content, including cryptocurrency, audio, video, text, and multimedia files; computer software to facilitate authentication of an authorized device or user of a computer system;
RVT TOKEN Rivetz Corp. 1209 Orange Street Wilmington DE 19801 Computer software for facilitating trusted computing; computer software for managing access to a private key; computer software for facilitating storing a private key; computer software managing a private key in a computer network computer software to enable hardware protection of a user's private keys; computer software for protecting private keys, including crypto currency private keys; computer software to facilitate a trusted execution environment (TEE); application program interface (API) software for device identification; computer software to facilitate secure transactions via computer and communication networks, including in the fields of banking, Bitcoin transactions, private messaging, and mobile applications; computer software, namely, software for authentication; computer software for authenticating computing devices, including mobile devices; computer software and hardware for security; computer software for use in safeguarding access to digital content, including cryptocurrency, audio, video, text, and multimedia files; computer software to facilitate authentication of an authorized device or user of a computer system;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for controlling integrity measurement of an un-trusted system component on a client system includes a trusted management utility configured to measure the integrity of the un-trusted system component, a trusted fixed token resident on the client system, and a trusted registration service. The trusted registration service creates a signed hash of the trusted management utility software and stores the signed hash of the trusted management utility software in the trusted fixed token. The trusted registration service creates a security domain and stores the security domain in the trusted fixed token. The trusted fixed token creates a signed hash of the trusted management utility software and the security domain, and securely communicates the signed hash of the trusted management utility software and the security domain to the trusted registration service. The trusted management utility software is installed on the client system and executed to gather integrity measurements on the un-trusted system component. A hash of the un-trusted system component and the trusted management utility software is created and stored in the trusted fixed token. This data may be combined with the security domain. The hash of the un-trusted system component, the trusted management utility software, and the security domain may be interrogated by the trusted registration service to verify the integrity of the un-trusted system component.