FindOwnerSearch
Brands and Their Owners
GIESECKE+DEVRIENT MOBILE SECURITY AMERICA, INC. contact information is shown below | |
Owner: | GIESECKE+DEVRIENT MOBILE SECURITY AMERICA, INC. |
---|---|
Owner Address: | 45925 Horseshoe Drive Dulles VA 20166 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
GRAVITY |
---|---|
Description: | Blank electronic chip cards; Blank smart cards; Blank smart cards embedded with transponders; Cards with integrated circuits; Electronic circuit cards; Encoded electronic chip cards containing programming used to process financial transactions; Encoded electronic chip cards for financial transactions; Encoded identity cards; Encoded smart cards containing programming used for financial transactions; Encoded smart cards containing programming used to financial transactions; Encoded smart cards embedded with transponders and containing programming used to process financial transactions; Magnetic coded cards for financial transactions; Magnetic identifying cards; Magnetically encoded blank bank cards for issuance by financial institutions; Magnetically encoded charge cards; Magnetically encoded credit cards; Magnetically encoded debit cards; Magnetically encoded gift cards; Magnetically encoded identity cards; Magnetically encoded key cards; Microchip cards; Network cards; all the foregoing sold only to commercial customers, namely, financial institutions and issuers of credit cards, debit card and gift cards; |
Category: | BLANK ELECTRONIC CHIP CARDS |
Brand: |
GRAVITY CARD |
---|---|
Description: | Blank electronic chip cards; Blank smart cards; Blank smart cards embedded with transponders; Cards with integrated circuits; Electronic circuit cards; Encoded electronic chip cards containing programming used to process financial transactions; Encoded electronic chip cards for financial transactions; Encoded identity cards; Encoded smart cards containing programming used for financial transactions; Encoded smart cards containing programming used to financial transactions; Encoded smart cards embedded with transponders and containing programming used to process financial transactions; Magnetic coded cards for financial transactions; Magnetic identifying cards; Magnetically encoded blank bank cards for issuance by financial institutions; Magnetically encoded charge cards; Magnetically encoded credit cards; Magnetically encoded debit cards; Magnetically encoded gift cards; Magnetically encoded identity cards; Magnetically encoded key cards; Microchip cards; Network cards; all the foregoing sold only to commercial customers, namely, financial institutions and issuers of credit cards, debit card and gift cards;CARD; |
Category: | BLANK ELECTRONIC CHIP CARDS |
Brand: |
TRUDI |
---|---|
Description: | Internet of things (IoT) security software and hardware; computer software and hardware for providing Internet of things (IoT) security solutions against hacking, intrusion, disruption of critical communication and other cybersecurity threats; computer software and hardware for protecting Internet of things (IoT) connected devices from malicious cyber attacks; Software for assessing cyber security threats in information technology infrastructure and computer network systems; software for testing the effectiveness of cyber security methods and systems in enterprises; computer software in the field of cyber security vulnerability testing of connected devices;TRUDY;Scientific and technological consulting, research and development in connection with computer hardware, computer software which encapsulates and permanently embeds the unique identifier within a device electronically either during the manufacturing process or post-manufacturing; Computer consulting in the field of security threat analysis for protecting data for computer networks and for computer transactions and computer applications which uses existing manufacturer serial numbers within a scheme which uniquely identifies a device across manufacturers and across networks; Data safeguarding in the nature of restricting unauthorized access to computer networks which provides cross references between unique identifiers on devices and the manufacturer, network provider, cloud provider, and/or owner of the device; Design, development and maintenance of computer software which provides a life-cycle history for devices using the unique identifier of the device; |
Category: | INTERNET THINGS IOT SECURITY |