FindOwnerSearch
Brands and Their Owners
Welcome to the Brand page for “FOUNDATION SECURITY TECHNOLOGIES TRUSTED² EMBEDDED | INTEROPERABLE”, which is offered here for The mark consists of the stylized words foundation security technologies in blue on one line, and the words trusted2 embedded interoperable in black on a second line below the first line. the 2 is raised as a superscript. a black first vertical bar separates the words trusted2 and embedded, and a second black vertical bar separates the words embedded and interoperable.;downloadable computer software and downloadable computer software development kits for integrating cryptographic security features into software platforms and applications; downloadable computer software development kits based on information system standards and it security standards; downloadable computer software for data recovery, data backup, data storage, data caching, data management, data storage management and data storage resource management; downloadable computer software for network data storage management and network data storage management control; downloadable computer software for the encryption, access control, monitoring and protection of electronic messages and documents, and user manuals sold as a unit with it; downloadable computer software in the nature of random number generators for use in cryptographic security systems; computer software products, downloadable computer software designed to issue and manage digital user identities and privileged information for electronic commerce and security; downloadable computer software programs designed to permit access to data by generating access codes and by verifying the access codes generated by non-predictable code calculators; computer hardware; computer hardware for data storage, management and retrieval; downloadable computer software for integrating cryptographic security features certified to work with third-party products; downloadable computer software for encryption, data communications and data security, securing e-mail and mobile devices, securing storage and transfer of data, providing user authentication and transaction security over a network, and issuing, monitoring and controlling smart cards and security tokens; downloadable computer software for diagnosing and testing computer systems; downloadable computer software in the field of cryptographic security, data security, identity theft, it security, data recovery, data backup, data storage, data caching, data management, data storage management, data storage resource management, network data storage management, network data storage management control, computer system testing and diagnostic, and printed instruction manuals therefor sold as a unit;foundation security technologies trusted two embedded | interoperable;the color(s) blue, and black is/are claimed as a feature of the mark.;authentication, issuance and validation of digital certificates; verification of personal identity via authentication of personal identification information; consulting services in the field of maintaining the security and integrity of data and databases; regulatory compliance consulting in the field of computer and cryptographic security;security technologies, embedded, or interoperable;consulting services in the field of data security; computer services, encrypted data recovery services; data encryption and decoding services; design and development of electronic data security systems; it security consultancy; providing temporary use of online non-downloadable software development tools for encryption, indexing, backup, recovery, archival, preservation, online storage, remote access, collaboration, synchronization, syndication, aggregation, organization, editing, visualization and analysis of electronic data, media and email; consulting services in the fields of compliance with information system standards and it security standards; consulting services for it due diligence, including the review and analysis of software source code; computer technology services in the nature of identification verification services, providing authentication of digital personal identification information; providing user authentication services using software technology for e-commerce transactions; computer security consultation in the field of data theft and identity theft;.
Its status is currently believed to be active. Its class is unavailable. “FOUNDATION SECURITY TECHNOLOGIES TRUSTED² EMBEDDED | INTEROPERABLE” is believed to be currently owned by “Cryptsoft Pty Ltd”.
Owner: |
CRYPTSOFT PTY LTD
Owner Details |
---|---|
Description: |
The mark consists of the stylized words FOUNDATION SECURITY TECHNOLOGIES in blue on one line, and the words TRUSTED2 EMBEDDED INTEROPERABLE in black on a second line below the first line. The 2 is raised as a superscript. A black first vertical bar separates the words TRUSTED2 and EMBEDDED, and a second black vertical bar separates the words EMBEDDED and INTEROPERABLE.;Downloadable computer software and downloadable computer software development kits for integrating cryptographic security features into software platforms and applications; downloadable computer software development kits based on information system standards and IT security standards; downloadable computer software for data recovery, data backup, data storage, data caching, data management, data storage management and data storage resource management; downloadable computer software for network data storage management and network data storage management control; downloadable computer software for the encryption, access control, monitoring and protection of electronic messages and documents, and user manuals sold as a unit with it; downloadable computer software in the nature of random number generators for use in cryptographic security systems; computer software products, downloadable computer software designed to issue and manage digital user identities and privileged information for electronic commerce and security; downloadable computer software programs designed to permit access to data by generating access codes and by verifying the access codes generated by non-predictable code calculators; computer hardware; computer hardware for data storage, management and retrieval; downloadable computer software for integrating cryptographic security features certified to work with third-party products; downloadable computer software for encryption, data communications and data security, securing e-mail and mobile devices, securing storage and transfer of data, providing user authentication and transaction security over a network, and issuing, monitoring and controlling smart cards and security tokens; downloadable computer software for diagnosing and testing computer systems; Downloadable computer software in the field of cryptographic security, data security, identity theft, IT security, data recovery, data backup, data storage, data caching, data management, data storage management, data storage resource management, network data storage management, network data storage management control, computer system testing and diagnostic, and printed instruction manuals therefor sold as a unit;FOUNDATION SECURITY TECHNOLOGIES TRUSTED TWO EMBEDDED | INTEROPERABLE;The color(s) blue, and black is/are claimed as a feature of the mark.;Authentication, issuance and validation of digital certificates; verification of personal identity via authentication of personal identification information; consulting services in the field of maintaining the security and integrity of data and databases; regulatory compliance consulting in the field of computer and cryptographic security;SECURITY TECHNOLOGIES, EMBEDDED, OR INTEROPERABLE;Consulting services in the field of data security; computer services, encrypted data recovery services; data encryption and decoding services; design and development of electronic data security systems; IT security consultancy; providing temporary use of online non-downloadable software development tools for encryption, indexing, backup, recovery, archival, preservation, online storage, remote access, collaboration, synchronization, syndication, aggregation, organization, editing, visualization and analysis of electronic data, media and email; consulting services in the fields of compliance with information system standards and IT security standards; consulting services for IT due diligence, including the review and analysis of software source code; computer technology services in the nature of identification verification services, providing authentication of digital personal identification information; providing user authentication services using software technology for e-commerce transactions; computer security consultation in the field of data theft and identity theft;
|
Categories: |