COMPUTER SOFTWARE SECURE DATA

Brand Owner (click to sort) Address Description
... NEVER STOPS CLEO COMMUNICATIONS US Suite 200 4949 Harrison Avenue Rockford IL 61108 Computer software for secure data transmission, computer network connectivity, data synchronization, data quality, cloud computing, bulk data transport and exchange, multi-modal access and data collaboration, manual and automated decision support, and automated routing, delivery, and receipt acknowledgement; Computer hardware and computer software for secure transfer, storage, management reporting, automated alerting and notification, analytics, sharing, tracking, integration, and data control of documents, files, information, text, photos, illustrations, video, and other multimedia content via computer networks, personal computers, mobile phones, computer tablets, facsimile, and other computing devices;Computer services in the nature of providing temporary use of non-downloadable software for secure data transmission, computer network connectivity, data synchronization, data quality, cloud computing, bulk data transport and exchange, multi-modal access and data collaboration, manual and automated decision support, and automated routing, delivery, and receipt acknowledgement; Computer services in the nature of providing temporary use of non-downloadable software for secure transfer, storage, management reporting, automated alerting and notification, analytics, sharing, tracking, integration, and data control of documents, files, information, text, photos, illustrations, video, and multimedia files;
CLEO...NEVER STOPS CLEO COMMUNICATIONS US Suite 200 4949 Harrison Avenue Rockford IL 61108 Computer software for secure data transmission, computer network connectivity, data synchronization, data quality, cloud computing, bulk data transport and exchange, multi-modal access and data collaboration, manual and automated decision support, and automated routing, delivery, and receipt acknowledgment; Computer hardware and computer software for secure transfer, storage, management reporting, automated alerting and notification, analytics, sharing, tracking, integration, and data control of documents, files, information, text, photos, illustrations, video, and other multimedia content via computer networks, personal computers, mobile phones, computer tablets, facsimile, and other computing devices;Computer services in the nature of providing temporary use of non-downloadable software for secure data transmission, computer network connectivity, data synchronization, data quality, cloud computing, bulk data transport and exchange, multi-modal access and data collaboration, manual and automated decision support, and automated routing, delivery, and receipt acknowledgment; Computer services in the nature of providing temporary use of non-downloadable software for secure transfer, storage, management reporting, automated alerting and notification, analytics, sharing, tracking, integration, and data control of documents, files, information, text, photos, illustrations, video, and multimedia files;
ERECEIPTS CROSSVUE, INC. 3051 North First Street San Jose CA 95134 computer software for secure data storage and secure data access and retrieval, and manuals packaged as a unit;Electronic storage of data;providing encrypted, multiple user dial-up and dedicated access to the Internet;E RECEIPTS;
ERGO ECOTALITY, INC. Suite 710 80 E. Rio Salado Parkway Tempe AZ 85281 Computer software for secure data storage and retrieval and transmission of confidential customer financial information used by individuals, banking and financial institutions; Point of sale transaction terminals; Computer software for transmitting financial information for use in the financial services, banking and telecommunications industries; Computer hardware and software for verifying the authentication of charge cards, bank cards, credit cards, prepaid cards, debit cards and payment cards and processing financial transactions; charging stations for electric vehicles and chargers for batteries;Financial services, namely, electronic transmission of financial transaction data via a global computer network;Charging station services for electric vehicles; Battery charging services in the nature of providing consumers with access to electric vehicle chargers and charging infrastructure of others by networking the electric vehicle chargers of different companies so that customers of any one of the charger companies can have access to any other charger on the network; Battery charging services in the nature of providing consumers with access to the electric vehicle chargers and charging infrastructure of others; Providing information in the field of electric vehicle charging via a global computer information network;Electronic funds transfer and statement of account services; Financial transaction processing services, namely, credit card, debit card, prepaid card, and network membership card processing services; Processing electronic payments and electronic funds transfers made through prepaid cards, credit cards, debit cards, and network membership cards; Processing electronic payments via a global computer network;Billing services; Advertising and promotional services for others; Providing subscriptions and membership club services that permit access to the commercial, public, and municipal electric vehicle chargers and electric vehicle charging infrastructure of others;
HIDE & SEEK MobiNetix Systems, Inc. 500 Oakmead Parkway Sunnyvale CA 940864056 computer software for secure data storage and secure data access and retrieval, and manuals packaged as a unit;HIDE AND SEEK;
MOVE VIEW ACT CLEO COMMUNICATIONS, INC. Suite 200 4949 Harrison Avenue Rockford IL 61108 Computer software for secure data transmission, computer network connectivity, data synchronization, data quality, cloud computing, bulk data transport and exchange, multi-modal access and data collaboration, manual and automated decision support, and automated routing, delivery, and receipt acknowledgement; Computer hardware and computer software for secure transfer, storage, management reporting, automated alerting and notification, analytics, sharing, tracking, integration, and data control of documents, files, information, text, photos, illustrations, video, and other multimedia content via computer networks, personal computers, mobile phones, computer tablets, facsimile, and other computing devices in International Class 9;Computer services in the nature of providing temporary use of non-downloadable software for secure data transmission, computer network connectivity, data synchronization, data quality, cloud computing, bulk data transport and exchange, multi-modal access and data collaboration, manual and automated decision support, and automated routing, delivery, and receipt acknowledgement; Computer services in the nature of providing temporary use of non-downloadable software for secure transfer, storage, management reporting, automated alerting and notification, analytics, sharing, tracking, integration, and data control of documents, files, information, text, photos, illustrations, video, and multimedia files in International Class 42;
OPDS TALON OWL CYBER DEFENSE SOLUTIONS 42 Old Ridgebury Road Danbury CT 06810 Computer software for secure data transfer;OWL PERIMETER DEFENSE SOLUTION TALON;
PROGINET TIBCO SOFTWARE INC. 3303 Hillview Avenue Palo Alto CA 94304 Computer software for secure data transfer and password, identity, and access management, control, and integration;Computer software consultation; Design, development and implementation of software;
SECUREGLOBE NIPPON DENKI KABUSHIKI KAISHA 7-1, Shiba 5-Chome, Minato-ku Tokyo 108-8001 Japan computer software to secure data on the server computer; computer systems featuring hardware programmed to secure data, comprising computers, modems, facsimile machines, and routers;SECURE GLOBE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A technique is disclosed for establishing a secure communication link between a first computer and a second computer over a computer network. Initially, a secure communication mode of communication is enabled at a first computer without a user entering any cryptographic information for establishing the secure communication mode of communication. Then, a secure communication link is established between the first computer and a second computer over a computer network based on the enabled secure communication mode of communication. The secure communication link is a virtual private network communication link over the computer network in which one or more data values that vary according to a pseudo-random sequence are inserted into each data packet.