DOWNLOADABLE ENCRYPTION SOFTWARE

Brand Owner (click to sort) Address Description
PQE2E PQShield LTD Prama House, 267 Banbury Road; Oxford OX2 7HT United Kingdom Downloadable encryption software; downloadable computer cybersecurity software; downloadable computer software for encryption and cryptography; computer hardware; downloadable computer software for mobile and data security; downloadable computer software applications for messaging; downloadable computer software developments kits (SDK); authentication apparatus and equipment, namely, computer hardware for data authentication; downloadable key exchange software for telecommunication; computer chip sets, being comprised of computer chips; downloadable software for processing digital certificate; downloadable software applications for controlling and interfacing with Internet of things enabled devices; computer hardware for data security and encryption; downloadable software for providing and maintaining data integrity, confidentiality, and authenticity; encryption apparatus in the nature of computer hardware for data encryption; downloadable encryption software; downloadable computer software for encryption; data encryption apparatus in the nature of computer hardware for data encryption; electronic encryption units; encryption devices in the nature of security token hardware; downloadable instant messaging software; downloadable cryptography software; downloadable software for data security and cryptography; downloadable data authentication software; downloadable computer software for biometric systems for the identification and authentication of persons;Computer communications services, namely, the transmission of information via electronic communications networks; computer intercommunication services, namely, electronic transmission of data and documents among users of computers; electronic messaging services;POST QUANTUM END TO END;PQE TWO E;Software creation, namely software development; software design; software development; computer software development and programming; software engineering; computer software research; computer design and programming services for others; computer security threat analysis for protecting data; computer software development; advisory and information services relating to the design and development of computer hardware; computer system design; computer design and development for others; computer aided scientific research services; computer engineering; computer hardware and software design; computer hardware development; computer programming; computer programming and maintenance of computer programs; computer programming and software design; computer security services for protection against illegal network access, namely, restricting unauthorized network access; computer security services in the nature of administering digital certificates; computer software engineering; computer software systems development; encryption of digital images, namely, data encryption services; encryption of digital music, namely, data encryption services; encryption, decryption and authentication of information, messages and data, namely, data encryption services; data encryption and decoding services; data encryption services; design and development of software for instant messaging; data security consultancy; data security consulting; computer data security services, namely, restricting unauthorized access to networks via firewalls; computer programming services for electronic data security; design and development of electronic data security systems; authentication services, namely, providing user authentication services using cryptography for controlling and confirming the source of data transmitted via telecommunications; authentication services, namely, providing user authentication services using cryptography for controlling and confirming the source of messages transmitted via telecommunications; authentication services for computer security, namely, providing user authentication services using cryptography for e-commerce transactions and secure entry and exit door access; user authentication services using technology for e-commerce transactions; providing user authentication services using biometric hardware and software technology for e-commerce transactions; providing user authentication services using single sign-on technology for online software applications; user authentication services using single sign-on technology for online software applications; computer hardware design; Infrastructure as a service (IAAS) services, namely, hosting public key infrastructure software for verification purposes;
TALER Taler Systems SA 7 rue de Mondorf L-5421 Erpeldange Luxembourg Downloadable encryption software for the purpose of making, processing and accepting digital payments and tokens; Downloadable packaged software for the purpose of making, processing and accepting digital payments and tokens; Downloadable application software for the purpose of making, processing and accepting digital payments and tokens; Downloadable software applications for the purpose of making, processing and accepting digital payments and tokens; Downloadable privacy software for the purpose of making, processing and accepting digital payments and tokens; Downloadable privacy protection software for the purpose of making, processing and accepting digital payments and tokens; Downloadable software for smartphones for the purpose of making, processing and accepting digital payments and tokens; Downloadable computer software applications for the purpose of making, processing and accepting digital payments and tokens; Downloadable computer software relating to the handling of financial transactions, namely, for the purpose of making, processing and accepting digital payments and tokens; Downloadable computer programmes relating to financial matters, namely, for the purpose of making, processing and accepting digital payments and tokens; Downloadable software for processing electronic payments to and from others; all the aforesaid products being for the purpose of making, processing or accepting digital payments and tokens but none being related to aerospace, space, defense, non-personal related IT security, non-public or non-personal transportation;Software licensing; computer software licensing; licensing of software; granting of software licenses; all the aforesaid services being for the purpose of making, processing or accepting digital payments and tokens but none being related to aerospace, space, defense, non-personal related IT security, non-public or non-personal transportation;Providing temporary use of on-line non-downloadable software for processing electronic payments; software creation; software development; software development, programming and implementation; computer software rental; software consulting services; all the aforesaid products being for the purpose of making, processing or accepting digital payments and tokens but none being related to aerospace, space, defense, non-personal related IT security, non-public or non-personal transportation;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. There is disclosed an apparatus for controlling a physical layer interface of a network interface card. The apparatus comprises: 1) a read only memory (ROM) for storing an embedded control program; 2) a random access memory for storing a downloadable software control program; and 3) a microcontroller for controlling the physical layer interface, wherein the microcontroller in a first operating mode executes the embedded control program to thereby control the physical layer interface, and wherein the microcontroller in a second operating mode downloads the downloadable software control program from an external processing system and executes the software control program in place of the embedded control program to thereby control the physical layer interface.