COMPUTER SOFTWARE THAT PROVIDES PROTECTION

Brand Owner (click to sort) Address Description
A Channelware, Inc. 1 Antares Drive, Suite 530 Nepean K2E 8C4 computer software that provides protection from piracy and provides per-use authorization for other software;providing the services of network and Internet marketing strategies to others;
METHOD-LEVEL PROTECTION ALADDIN KNOWLEDGE SYSTEMS, LTD. PO Box 3968 35 Efal st . Kiryat Arye Petach Tikva 49511 Israel computer software that provides protection technology, including technology that separately encrypts each method of a NET assembly against reverse-engineering;
NET ACTIVE CHANNELWARE INC 1 Antares Drive, Suite 530 Nepean, Ontario K2E 8C4 Canada computer software that provides protection from piracy and provides per-use authorization for other software;marketing consulting services regarding strategies for protection from piracy, and strategies for providing per-use authorization, of software and digital, video, or music content products of others, all in network and global computer information network applications;NET;
NETACTIVATED NetActive Inc. 1 Antares Drive Suite 530 Nepean, Ontario KZE 8C4 Canada computer software that provides protection from piracy and provides per-use authorization for other software;NET ACTIVATED;Providing protection from piracy and per-use authorization for other software for network and Internet applications;
NOW YOU CAN Channelware, Inc. 1 Antares Drive, Suite 530 Nepean K2E 8C4 computer software that provides protection from piracy and provides per-use authorization for other software;providing the services of network and Internet marketing strategies to others;
PLAY! RENT! BUY! UNIFIED DISTRIBUTION, INC. 9286 CEDAR TRAILS LANE VALLEY CENTER CA 92082 computer software that provides protection from piracy and provides per-use authorization for other software, for general use;PLAY RENT BUY;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.