Filters
on 11 Jan 2024
ONESPAN NORTH AMERICA INC.
1927833 · 30 Oct 2018
009
Class 009
Computer & Software Products & Electrical & Scientific Products
Mobile application software for automating and securing the interaction between users and computer based business applications, software in the field of machine learning and artificial intelligence for automating and securing the interaction between users and computer based business applications, Cyber security software, authentication server software, downloadable computer security software, software for network and device security, software for application, transaction and identity security related to mobile device applications, software for data security, software for ensuring the security of electronic mail, software for virus tracking and virus neutralization, Electronic publications, downloadable, relating to the field of cyber security, internet security, computer security, computer network security, data security and cryptography, computer security SDKs (Software Development Kits), mobile application security SDKs, SDKs for authentication of user identities, SDKs for biometric security software, real-time fraud prevention software, software for monitoring, detecting and blocking of fraudulent transactions, software for logging, monitoring and securing of internet and mobile services, software for analyzing, and detecting unusual patterns in, user and transaction data including behavioral and contextual data, software for behavioral analytics, Mobile application security software, software for detecting, preventing and reporting mobile cyber attacks, anti malware software, runtime application self-protection software, jailbreak and root detection software, device identification and device binding software, software for identifying an individual electronic device, software for binding an application instance to an individual electronic device, device fingerprinting software, secure communications software, namely, software for monitoring and controlling communication between computers and automated machine systems, Electronic apparatus, namely, smart cards, USB tokens and authentication tokens for enabling secure telecommunications, Smart card readers, wireless radio enabled devices, namely, authentication tokens with wireless radio interface, USB hardware, USB smart card readers, USB tokens, USB sticks, key fobs, smart cards, PKI smart cards, wearable electronic apparatus, namely universal serial bus (USB) sticks on lanyards and smartwatches, parts and fittings for all the aforesaid goods, Electronic apparatus, USB hardware, USB tokens, encoded smart cards containing programming used for security, authentication and encryption, cards encoded with security features for identification purposes, electronic encryption units, electronic security tags, electronic identification tags, Electronic apparatus, computer peripheral equipment, USB hardware, USB tokens, smart cards, smart card readers, authentication tokens and software, server software and mobile application software, for use in the field of cyber security, internet security, computer security, computer network security and cryptography, Electronic apparatus, computer peripheral equipment, USB hardware, USB tokens, smart cards, smart card readers, authentication tokens and software, server software and mobile application software, used all for the protection of online transactions and data transfer by electronic means, Electronic apparatus, computer peripheral equipment, USB hardware, USB tokens, smart cards, smart card readers, authentication tokens and software, server software and mobile application software, all for electronic generation and verification of authentication credentials and signatures, Electronic apparatus, computer peripheral equipment, USB hardware, USB tokens, smart cards, smart card readers, authentication tokens and software, server software and mobile application software, all for use in, for connecting to and for providing Public Key Infrastructures (PKI), Electronic identification devices programmed with specific parameters to obtain an authentication code for securing electronic transactions, bank operations, remote application access and securing data transfers, Electronic security tokens in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication to access computers, web sites, remote computer based applications, electronic networks and databases, Software, mobile application software, electronic apparatus, namely, authentication tokens and smart card readers adapted to optically capture digital information, software, mobile application software, electronic apparatus, namely, authentication tokens and smart card readers for capturing and decoding 2Dbarcodes, software for use in the field of biometric verification, software for biometric systems for the identification and authentication of persons, biometric access control systems, biometric voice recognition systems, software for capturing, analyzing and verifying biometric traits, software for capturing, analyzing and verifying fingerprints, retinal scan, voice, heartbeat, gait and vein patterns, biometric retinal scanners, Face recognition software, software for capturing, analyzing and verifying behavioral biometrics, behavioral authentication software, software for behavioral biometrics, namely, dynamic keystrokes and swiping patterns, software for capturing, analyzing and verifying geolocation data, software for recording, processing, manipulating and analyzing sounds and images, Electronic apparatus and software for providing cyber security, internet security, computer security, computer network security, data security and cryptography, Electronic apparatus, namely, authentication tokens and smart card readers and software, server software and mobile application software for security, data security, authentication and data encryption, Electronic apparatus, namely, hardware and software for providing multi-factor authentication, Electronic apparatus, namely, hardware and software for providing layered security, Electronic apparatus and software for continuous, transparent and frictionless authentication, software for coordinating and orchestrating authentication and cyber security, Electronic apparatus namely, hardware and software for protecting computer networks by authenticating, enforcing, restricting and controlling access privileges to users of computer networks, mobile devices and applications, Electronic apparatus, namely hardware and software for securing telecommunications, data communications, electronic communications and digital communications, Electronic apparatus, namely, hardware and software for securing access to and operation on the Internet, Electronic apparatus, namely, hardware and software for the security of data-transfer by electronic means and via computer networks, Electronic apparatus, namely, hardware and software for identification of persons, electronic apparatus, namely, hardware and software for providing, verifying and proving the identity of persons, Electronic apparatus, namely, hardware and computer software used to identify and authenticate users of intranet and internet websites and used to authenticate user access to intranet and internet sites, wide area networks (WAN) and local area networks (LAN) in order to secure online communications and transactions, Electronic apparatus, namely, hardware and software for the security of physical and virtual objects, Electronic apparatus, namely, hardware and software for controlling user access, Electronic apparatus, namely, hardware and software for access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications and to electronic databases, Electronic apparatus, namely, hardware and computer software used for remote control of access to computers, computer based applications and telecommunications networks, Electronic apparatus, namely, hardware and software for digital certificate and encryption key management in the field of Public Key Infrastructures (PKI), Electronic apparatus, namely, hardware and software used for securing electronic and online transactions, Electronic apparatus, namely, hardware and software for providing non repudiation of electronic and online transactions, Electronic apparatus, namely, hardware and software for the certification of orders given via computer and certifying electronic instructions, Electronic apparatus, namely, hardware and software for secure transaction authentication for use in the field of banking and online consumer transactions, Electronic apparatus, namely, hardware and software used for ensuring the security of banking operations and bank transactions, electronic apparatus, namely, hardware and software for securing internet banking, Electronic apparatus, namely, hardware and software used for ensuring the security and authentication of orders given by computer, Electronic apparatus, namely, hardware and software for use in the field of risk analysis, including risk analysis of electronic and remote transactions, transaction requests, and access requests, software for assessing the risk associated with end user identities, Electronic apparatus, namely, hardware and software in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote transactions, Electronic apparatus, namely, hardware and software for securing and protecting virtual, electronic and digital assets, Electronic apparatus, namely, hardware and software for creating, managing and transferring digital money, electronic and digital currencies and cryptocurrencies, Electronic apparatus, namely, hardware and software for creating, managing and transferring distributed ledgers and blockchains, Electronic apparatus, namely, hardware and software for creating, managing and transferring digital data, Electronic apparatus, namely, hardware and software for ensuring the confidentiality, integrity and authenticity of digital data, Electronic apparatus, namely, hardware and software for controlling the use, modification, and distribution of copyrighted works, Electronic apparatus, namely, hardware and software for storing, managing, encrypting and protecting access to personal data, Electronic apparatus, namely, hardware and software for digital identity management, Software for customer enrollment, customer management and electronic transaction facilitation, Electronic apparatus, namely, hardware and software for securing electronic payment services, internet banking and mobile banking services, Electronic apparatus, namely, hardware and software in the field of e-government for governments to communicate with and provide services to citizens, Software for electronic signature applications and systems, namely, administrative and user applications and digital storage systems, Software programs allowing users to electronically approve documents using secure electronic signatures, Electronic apparatus, namely, hardware and software for the encoding of sound, images and data, Software for capturing an approval of an electronic or online transaction, software for generating and capturing electronic proof of authorization of electronic and online transactions and documents, software for generating electronic signatures, software for electronically signing electronic and online transactions, software for signing electronic documents, software for capturing electronic document signatures, Electronic signature software, Transaction management software programs, Software for electronic document management, software allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, Software for ensuring the legal enforceability, regulatory compliance and auditability of documents or transactions, Software for obtaining secure electronic forensic evidence relating to the business transaction process and documents, Electronic signature and transaction management software programs allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents, software for capturing and storing electronic data, software for capturing and storing audit trail data, Software for capturing and storing electronic signature data, software for capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did regarding an electronic signature, software for capturing and storing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did, Software for capturing and storing data documenting an electronic signature process, software for capturing and storing data documenting electronic delivery of documents and information, Software for viewing and reviewing electronic data, software for viewing and reviewing audit trail data, software for viewing and reviewing electronic signature data, Software for viewing and reviewing electronic data that allows reproducing exactly what a signer saw and did, software for viewing and reviewing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did, software for viewing and reviewing data documenting an electronic signature process, software for viewing and reviewing data documenting electronic delivery of documents and information, software for reviewing and verifying electronic forensic evidence, Software for reproducing an authorization and approval process of electronic transactions and documents, software for reproducing a signing process of electronic transactions and documents, Software for securely storing electronic documents, electronic vaulting software, all the aforementioned to the exception of computer hardware and computer software for formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking, in particular in the field of semiconductor production.
038
Class 038
Communications Services
Providing access to telecommunication networks, providing secure access to computer networks especially through securing computer networks by means of online authentication of electronic signatures and online generation and verification of authentication credentials and electronic signatures, Providing secure and authenticated access to computer networks, web sites, electronically accessible applications and computer applications, providing electronic transmission of secure e-mail, provision of wireless application protocol services, provision of wireless application protocol services utilizing a secure communications channel, Information, advisory and consultancy services in relation to all the aforesaid services, all the aforementioned services to the exception of education, providing of training, arranging and conducting of workshops and training courses, computer training, all of the aforementioned exceptions only for formal verification, this does not include personal identity verification and authentication, and sequential equivalence checking purposes, in particular in the field of semiconductor production.
...
Class 042
Computer & Software Services & Scientific Services
Computer hosted, online and cloud-based cyber security services, namely software as a service for providing cyber security, Services in the field of electronic and digital signatures, data protection and data traffic, encryption, issuing and management of digital certificates, electronic authorization, authentication and identification of persons, data encryption, development of electronic identification (ID), Online authentication of electronic signatures, namely, electronic signature verification services in connection with banking services, Electronic signature verification services using technology to authenticate user identity, provision of security services for computer networks, computer access and computerized transactions, computer security services for protection against illegal and illegitimate network access, Online authentication of electronic signatures, Online security services, namely, providing security for electronic transactions, computer security services, namely, restricting access to and by computer networks to and of web sites, media, and individuals, computer security services, namely, protecting computers, web sites and databases against unauthorized access, providing access control to computers, electronic networks, web sites and databases, providing security of web sites, computers and databases, providing secure and authenticated access to computer networks, web sites, electronically accessible applications and computer applications, providing secured online transactions and secured data transfer by electronic means, namely, providing user authentication services using biometric hardware and software technology for e-commerce transactions, Online security services, namely, providing security for electronic transactions in the nature of providing fraud detection services for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network, providing user authentication services, namely, verifying digital signatures and passwords electronic signature and digital credential verification services using technology to authenticate user identity, use passwords, digital credentials and electronic signatures, providing user authentication services, namely, verifying digital signatures and passwords used to authorize transactions and access networks and online services, Monitoring of computer systems for security purposes in the nature of monitoring data transmission and online transactions, providing user authentication services in e commerce transactions, electronic signature verification services for security purposes, Online identity management services, namely, electronic signature and digital credential verification services using technology to authenticate user identity, online trusted identity management services, online access management services, namely, providing an interactive website featuring technology that enables users to access data, computer security services, namely online generation and verification of authentication credentials and electronic signatures for restricting unauthorized network access by users without credentials, online identity brokerage services, Data security services, Online services in the field of protecting digital data, namely, electronic storage of digital data, Online services in the field of privacy protection, namely, personal data security consultancy services, Online and cloud-based real-time fraud prevention services, Computer hosted, online and cloud-based services and software as a service for analyzing, and detecting unusual patterns in, user and transaction data including behavioral and contextual data, Software as a service for authentication of electronic signatures and generation and verification of authentication credentials and electronic signatures, providing temporary use of non-downloadable software for authenticating users and for signing documents accessible via a web site, Rental of internet security programs, Computer hosted and online and cloud based services and software as a service in the field of fraud detection, risk detection, risk management, fraud management, risk analysis, fraud analysis and fraud prevention, all related to electronic, digital, online and remote transactions, Computer hosted and online and cloud based services and software as a service for risk analysis, Computer hosted and online and cloud based services and software as a service for risk analysis of electronic and remote transactions, electronic transaction requests, and user account access requests, Computer hosted and online and cloud based services and software as a service for assessing the risk associated with end user identities, Computer hosted, online and cloud-based services and software as a service for coordination and orchestration of authentication and cybersecurity, Computer hosted, online and cloud based services and software as a service for securing electronic and online transactions, Computer hosted, online and cloud-based services and software as a service for capturing an approval of an electronic and online transaction, Computer hosted, online and cloud-based services and software as a service for generating and capturing electronic proof of an authorization of an electronic and online transactions and documents, Computer hosted, online and cloud based services and software as a service for generating electronic signatures, Computer hosted, online and cloud-based services and software as a service for electronically signing electronic and online transactions, Computer hosted, online and cloud-based services and software as a service for signing electronic documents, Computer hosted, online and cloud-based services and software as a service for capturing electronic document signatures, Computer hosted, online and cloud-based services and software as a service allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, Computer hosted, online and cloud-based services and software as a service for ensuring the legal enforceability, regulatory compliance and auditability of documents and transactions, Computer hosted, online and cloud-based services and software as a service for obtaining secure electronic forensic evidence relating to the business transaction process and documents, Computer hosted, online and cloud-based services and software as a service allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents, Electronic signature and transaction management software as a service allowing users to electronically send, sign, receive and manage documents as part of an electronic business transaction, to ensure the legal enforceability, regulatory compliance and auditability of the documents and transactions, and to obtain secure electronic forensic evidence relating to the business transaction process and documents, Computer hosted, online and cloud based services and software as a service for capturing and storing electronic data, Computer hosted, online and cloud-based services and software as a service for capturing and storing audit trail data, Computer hosted, online and cloud-based services and software as a service for capturing and storing electronic signature data, capturing and storing electronic evidence data that allows reproducing exactly what a signer saw and did, capturing and storing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did, Computer hosted, online and cloud-based services and software as a service for capturing and storing data documenting an electronic signature process, Computer hosted, online and cloud-based services and software as a service for capturing and storing data documenting electronic delivery of documents and information, Computer hosted, online and cloud-based services and software as a service for viewing and reviewing electronic data, Computer hosted, online and cloud-based services and software as a service for viewing and reviewing audit trail data, Computer hosted, online and cloud-based services and software as a service for viewing and reviewing electronic signature data, computer hosted and online services and software as a service for viewing and reviewing electronic evidence data that allows reproducing exactly what a signer saw and did, computer hosted and online services and software as a service for viewing and reviewing audit trail data that allows reproducing exactly what a signer of an electronic document saw and did, Computer hosted, online and cloud-based services and software as a service for viewing and reviewing data documenting an electronic signature process, Computer hosted, online and cloud-based services and software as a service for viewing and reviewing data documenting electronic delivery of documents and information, Computer hosted, online and cloud-based services and software as a service for reviewing and verifying electronic forensic evidence, Computer hosted, online and cloud-based services and software as a service for reproducing an authorization and approval process of an electronic transaction and document, Computer hosted, online and cloud-based services and software as a service for reproducing a signing process of an electronic transaction and document, Computer hosted, online and cloud-based services for the digitization and automation of business workflows such as onboarding a new customer, Services for the secure digital storage of electronic documents, Information, advice and consultancy relating to the aforesaid services, whether or not via the Internet, Consultancy in the field of computer data security, technical consultancy in the field of information and communications technology (ICT), Consultancy in the field of cyber security, internet security, computer security, computer network security, data security, cryptography, electronic signatures, electronically signing documents, and making secure data transfers and bank operations via computer networks and telecommunication networks, consultancy in the field of software and technology for electronic document management, Services provided by computer professionals in the field of security and certification of telecommunications, security testing of telecommunications, cyber security vulnerability testing, vulnerability testing and security testing of electronic systems, computer systems, computer based applications, remotely accessible applications, computer software, sever software and mobile application software, Consultancy in the field of fraud detection, risk detection, risk management, fraud analysis and fraud prevention, all related to electronic, digital, online and remote transactions, Design, development, customization, installation, updating and maintenance of computer software, computer programming, Website design, development and maintenance, webhosting, scientific and technological research in the field of computer security, development of software for managing and providing access to documents, archives and documentation, Design, development, customization, installation, updating and maintenance of software for authentication of computer application users, software for signing electronic documents and software relating to computer security, Designing, developing, customizing, installing, updating and maintaining computer software in the field of cyber security, internet security, computer security, computer network security, data security, cryptography, electronic signatures, electronically signing documents, and making secure data transfers and bank operations via computer networks and telecommunication networks, Computer programming services for electronic data security, design and development of electronic data security systems, programming of internet security programs, design and development of internet security programs, Design, development, customization, installation, updating and maintenance of computer software relating to computer security and prevention of computer risks, testing, analysis and evaluation services in the telecommunications field, for the purpose of certification and designing, updating and maintaining computer software of others used for security and certification of electronic instructions, Designing, developing, updating and maintaining computer software in the field of electronic document management, Research relating to computer security, all the aforementioned services to the exception of scientific and technological services and research and design relating thereto, industrial analysis and research services, design and development of computer hardware and software, development of verification software, licensing of computer software, in particular formal verification (this does not include personal identity verification and authentication) software, providing of computer software technical support services, application engineering, all of the aforementioned exceptions only for formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking purposes, in particular in the field of semiconductor production development, production and distribution of software for the formal verification (this does not include personal identity verification and authentication) and sequential equivalence checking of semiconductors and other technical components as well as the provision of any related services.
Mobile application software for automating and securing the interactio...
Image Search
Drag and drop or upload to search any image