COMPUTER SOFTWARE ELECTRONIC SIGNATURE

Brand Owner (click to sort) Address Description
FREJA Freja eID Group AB Box 3328 SE-103 66 Stockholm Sweden Computer software for electronic signature verification and computer hardware; computer software and hardware for publishing, checking, support and blocking relating to electronic identification, log-in, certification, signing and signature; computer software for encryption and authentication of data; computer software for electronic signature identification; computer software for electronic monitoring of personally identifying information to detect identity theft and electronic signature verification; computer application software for electronic signature verification; downloadable application software for cloud computing for electronic signature verification and authentication;Telecommunications and data communications services, namely electronic transmission of data and documents; communications services, namely, electronic transmission of data and documents for identification and electronic signature between parties via the Internet; providing access to electronic network services for identification and electronic signature between parties via the Internet; providing user access to databases, global computer networks and computer programs in data networks;Financial transaction services, namely, providing secure debit card payment transactions through the validation of user identity;Verification of personal identity as part of personal background investigations to resolve claimed identity to a single, unique individual within the context of the population of users, and to validate that supplied evidence for a claimed identity is correct and genuine and that the claimed identity exists in the real world; conducting personal security clearance background investigations for the purpose of electronic identity issuance; conducting personal security clearance background investigations to provide authentication of personal identification information; conducting personal security clearance background investigations for the purpose of security clearance for preparation of identification cards;Computer programming; design, updating and maintenance of computer software; development of computer hardware and software; IT security services, namely, computer security services in the nature of protection of computer data, namely restricting unauthorized network access by users without credentials; computer security and information technology consulting services in the field of computer security pertaining to publishing, checking and blocking relating to electronic identification, log-in, certification, signing and signature; consultancy in the field of computers, namely, computer security consultation; identification authentication, issuance and validation of digital certificates; data encryption services; computer software consultancy and consultancy in the field of design, selection, implementation and use of computer hardware; computer security consultancy; software as a service (SaaS) services featuring software for use in authentication and signature validation; electronic monitoring of personally identifying information to detect identity theft via the Internet; computer security services for computer networks, namely, restricting unauthorized access to computer networks, hard drives, other data storage devices and websites, including cloud based storage of data;
TRUESIGN I3-IMAGESOFT 40 BURTON HILLS BLVD. SUITE 415 NASHVILLE TN 37215 Computer software for electronic signature management that applies a signature derived from the users true signature, along with other identifying information, to document images and electronic documents;TRUE SIGN;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Systems and methods for preventing the unauthorized access to data stored on removable media, such as software, include storing a predetermined signature in the area of non-volatile memory in a computer system. Upon initialization of the computer system, a check is made to verify the signature. Only if the signature is verified will decoding software operate.