COMPUTER SOFTWARE SECURING ACCESS

Brand Owner (click to sort) Address Description
INTRUSION DECEPTION JUNIPER NETWORKS, INC. 1133 Innovation Way Sunnyvale CA 94089 Computer software for securing access to networks, websites, web applications, mobile devices, data centers, and data;
LUTHERWEB EVANGELICAL LUTHERAN CHURCH IN AMERICA 8765 W. Higgins Road Chicago IL 60631 computer software for securing access to global computer networks;
LUTHERWEB PLUS EVANGELICAL LUTHERAN CHURCH IN AMERICA 8765 W. Higgins Road Chicago IL 60631 computer software for securing access to global computer networks; and, computer software for electronic messaging;LUTHER WEB PLUS;
PATHMAKER KEY ARVO SOFTWARE, INC. 737 Loma Verde Ave. #6 Palo Alto CA 94303 computer software for securing access capability to mainframe computer databases;PATH MAKER KEY;KEY;
PRIVACYSHELL NSuite Technologies, Inc. 60 Weston Rd Lincoln MA 01773 Computer software for securing access to networks and computers and applications, both internal and external to the enterprise, physical doors within a facility, and time and attendance functionality;PRIVACY SHELL;
PROXIMEX SENSORMATIC ELECTRONICS 6600 Congress Avenue Boca Raton FL 33487 computer software for securing access to physical property, assets and buildings; computer software for monitoring entry points, exit points and physical access points all for buildings and property; computer software for reporting on access to and from buildings and property; computer software for detecting, analyzing and responding to security incidents; computer software for tracking, reporting and coordinating responses to security incidents; computer software for evaluating and analyzing security data from existing physical property and building security systems to identify and assess the urgency and validity of security breaches; computer software for compiling, monitoring and analyzing data from existing security systems; computer software for coordinating and controlling existing security systems;
PROXIMEX Proximex Corporation 440 N. WOLFE RD. SUNNYVALE CA 94085 computer software for securing access to physical property, assets and buildings; computer software for monitoring entry points, exit points and physical access points all for buildings and property; computer software for reporting on access to and from buildings and property; computer software for detecting, analyzing and responding to security incidents; computer software for tracking, reporting and coordinating responses to security incidents; computer software for evaluating and analyzing security data from existing physical property and building security systems to identify and assess the urgency and validity of security breaches; computer software for compiling, monitoring and analyzing data from existing security systems; computer software for coordinating and controlling existing security systems;
SURVEILLINT SENSORMATIC ELECTRONICS 6600 Congress Avenue Boca Raton FL 33487 computer software for securing access to physical property, assets and buildings; computer software for monitoring entry points, exit points and physical access points all for buildings and property; computer software for reporting on access to and from buildings and property; computer software for detecting, analyzing and responding to security incidents; computer software for tracking, reporting and coordinating responses to security incidents; computer software for evaluating and analyzing security data from existing physical property and building security systems to identify and assess the urgency and validity of security breaches; computer software for compiling, monitoring and analyzing data from existing security systems; computer software for coordinating and controlling existing security systems;SURVEILLANT;Providing online non-downloadable computer software for securing access to physical property, assets and buildings; providing online non-downloadable computer software for monitoring entry points, exit points and physical access points all for buildings and property; providing online non-downloadable computer software for reporting on access to and from buildings and property; providing online non-downloadable computer software for detecting, analyzing and responding to security incidents; providing online non-downloadable computer software for tracking, reporting and coordinating responses to security incidents; providing online non-downloadable computer software for evaluating and analyzing security data from existing physical property and building security systems to identify and assess the urgency and validity of security breaches; providing online non-downloadable computer software for compiling, monitoring and analyzing data from existing security systems; providing online non-downloadable computer software computer software for coordinating and controlling existing security systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method are diminish the use of an automated program in a networked environment. A server can provide access to a service. In addition, a software module provides a client computer with a visual test upon a request transmitted through a network by the client computer for the service. The visual test requires the client computer to perform a predetermined action on a shaped object displayed on a video display in order to gain access to the service. A validation software module receives a request from the software module for the shaped object to be displayed on the video display. Further, the validation software module randomly selects a shaped object to be transmitted to the software module. The validation software module provides the software module with the shaped object. An access software module receives an access instruction from the validation software module if the client computer passes the visual test. The client computer can access the service if the client computer passes the visual test.