88325541
Mar 5, 2019
Nov 10, 2020
Active Trademark
Downloadable computer application software, namely, downloadable application programming interface (API) software for computers, tablet computers, hand held computers, portable media players, and mobile devices, namely, data synchronization software, security software, password management and protection software, biometric identification and management, genomic identification and management, matching and authentication software, automatic notification software, data access permissions, revocations, and notifications software, database maintenance software, information storage compliance software, trust assessment software, data scrubbing and de-identification software for protection and control of users' information; Downloadable computer software, namely, downloadable application programming interface (API) software for computers, tablet computers, hand held computers, portable media players, medical and mobile devices, namely, data synchronization software, security software, password management and protection software, bio metric identification and management, genomic identification and management, matching and authentication software, automatic notification software, data access permissions, revocations, and notification software, electronic consent receipts software, database maintenance software, information storage compliance software, trust assessment software, data scrubbing software, data risk automation software for protection and control of users' information; Downloadable computer software for managing transactions using blockchain technology
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for data synchronization, security, password management and protection, biometric identification, credential matching and authentication, email account scanning, assessment of data holders to inform identity verification, authentication, and validation processes; Software as a service (SAAS) services featuring software for providing an authorized e-proxy scheme, namely, an e-proxy scheme to determine data holder access to information; Software as a service (SAAS) services featuring software for providing searching of target data holders, selection of target data holders, data access permissions, revocations and notifications, storage and maintenance of information in databases and document management systems, assuring compliance with legislation and regulations applying to personal information, data scrubbing and de-identification; Providing temporary use of a web-based software application for data synchronization, security, password management and protection, biometric identification and management, genomic identification and management, matching and authentication, email account scanning, assessment of data holders to inform identity verification, authentication, and validation processes, authorized e-proxy scheme to determine data holder access to information, searching of target data holders, selection of target data holders, data access permissions, revocations and notifications, storage, consent receipts and maintenance of information in databases and document management systems, assuring compliance with legislation and regulations applying to personal information, data scrubbing; Computer software design; Computer software development
Computer and ScientificIdentification verification services, namely, providing authentication of personal identification information; Digital identity access rights management for protecting data and information from unauthorized access; Personal information access rights management for protecting data and information from unauthorized access; Online privacy management, namely, authentication, assurance, validation, and revocation of digital certificates and consent receipts providing user authentication services in bilateral e-commerce transactions, open data flows, data synchronization, security, password management and protection, biometric identification and management, genomic identification and management, matching, and authentication
Personal