SECURITY IDENTIFICATION VERIFICATION SERVICES

Brand Owner (click to sort) Address Description
SECURE HEALTH AND PRIVACY ENVIRONMENT Secure Services Corp. 1411 Opus Place Suite 100 Downers Grove IL 60515 Security identification verification services, namely, providing authentication of personal identification information via private, secure, and encrypted storage and transmission of such information via a computer network; security identification verification services, namely, providing authentication of personal identification information for use in fraud prevention and to reduce risk in transactions in the field of electronic communication over a computer network; security services, namely, authentication of personal identification over a computer network; providing user authentication services in the field of electronic business transactions; fraud detection services in the field of personal identification;
SHAPE Secure Services Corp. 1411 Opus Place Suite 100 Downers Grove IL 60515 Security identification verification services, namely, providing authentication of personal identification information via private, secure, and encrypted storage and transmission of such information via a computer network. Security identification verification services, namely, providing authentication of personal identification information for use in fraud prevention and to reduce risk in transactions in the field of electronic communication over a computer network. Security services, namely, authentication of personal identification over a computer network. Providing user authentication services in the field of electronic business transactions. Fraud detection services in the field of personal identification;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system for facilitating secure network communications includes a security computer system and corresponding software. The security system is utilized in conjunction with a voice browser residing on a server system. A user accesses the network by placing a call to the voice browser system. The voice browser includes a software module that creates a secure connection to the security system. The user provides an identification to the voice browser system that is transferred to and verified by the security system. Once the identification is verified, the user is prompted by the voice browser system to speak a phrase for voice verification. The verification speech signals are transferred from the voice browser system to the security system to verify those speech signals against speech signals of a particular authorized user associated with the identification and stored in a database. When the user is verified, the security system retrieves a user private key and certificate from the database. In response to the user subsequently accessing a web site residing on a secure server, the secure server and voice browser system initiate a secure key exchange. During the key exchange, data packets containing security information are transferred from the voice browser system to the security system for processing, while security information from the security system is transferred to the secure server via the voice browser system. The resulting session key is securely transferred to the voice browser system to facilitate secure communications between the voice browser system and secure server.