Computer software consultancy; computer software design; computer programming services; repair, maintenance and installation services relating to computer software and programs; installation of computer software; maintenance of computer software; updating of computer software; provision of advice and consultancy regarding the maintenance of the security of computers and integrity of computer systems, local computer networks, intranets, global computer networks and the Internet; provision of advice, consultancy and information regarding the repair, maintenance and installation services relating to computer software and programs; on-line information services regarding computer software consultancy services and the repair, maintenance and installation services relating to computer software and programs
Communications equipment and authentication devices, namely, authentication computer servers, electronic encoded chip cards for the purpose of maintenance of the security and integrity of computer systems, local computer networks, intra-nets, global computer networks and the Internet and the analysis, assessment, monitoring or validation of individual identity information for access control; access control equipment for the purpose of maintenance of the security and integrity of computer systems, local computer networks, intra-nets, global computer networks and the Internet and the analysis, assessment, monitoring or validation of individual identity information for access control; biometric devices, namely, devices providing identification via physical characteristics such as facial recognition, iris scanning, and finger print technology, and smart card readers
Security services, namely, managing the issuance of digital identities, smart cards and electronic security tokens, such services provided via a secure computer environment; Providing temporary use of online non-downloadable software for security management for computers and computer networks; providing temporary use of online non-downloadable integrated computer software for computer security using cryptography, digital signatures, smart cards, and biometrics; computer services, namely, creating and managing secure computing systems for the purpose of allowing others a secure computer environment within which they may manage the issuance of smart cards, electronic security tokens, and digital identities
Scientific apparatus and instruments, namely, [ computers, computer servers, computer hardware and ] computer security software [, telephones, mobile phones, smart telephones, tablet computers, personal digital assistants and hand held personal computers, ] for the analysis, assessment, monitoring or validation of individual identity information; [ computers; computer hardware and ] computer software for analysis, assessment, monitoring or validation of individual identity information; [ computer peripherals; integrated circuits; interfaces for computers; ] downloadable electronic publications, namely, articles in the field of digital user identity management; [ computer hardware and computer software for database management; apparatus, namely, computers, telephones, mobile phones, smart telephones, tablet computers, personal digital assistants and hand held personal computers, for searching electronic information from a global computer network or the Internet; blank data carriers, namely, magnetic and electronic data carriers; pre-recorded data carriers, namely, magnetic and electronic data carriers bearing information for the analysis, assessment, monitoring or validation of an individual's identity; data processing equipment; data processing apparatus; computers, computer servers, computer hardware and computer security software, telephones, mobile phones, smart telephones, tablet computers, personal digital assistants and hand held personal computers regarding the maintenance of the security and integrity of computer systems, local computer networks, intra-nets, global computer networks and the Internet ]
[ Scientific apparatus and instruments, namely, encoded smart cards containing programming used to send and receive data, encoded smart cards for security purposes containing programming used for secure access; card readers; encoded smart cards bearing stored data, encoded or magnetic cards all for sending and receiving data; scientific apparatus for the sending and receiving of data, namely, computers, transmitters and receivers; electrical and electronic apparatus for security purposes, namely, control access panels; communications equipment and authentication devices, namely, authentication computer servers, electronic token devices, namely, electronic encoded chip cards, access control equipment, biometric devices, namely, devices providing identification via physical characteristics such as facial recognition, iris scanning and finger point technology, and smart card readers; computers, computer hardware and] computer software for security management for computer networks and applications; web-based [ computer hardware] and software, namely, downloadable software designed to create and manage a secure computing environment; [ computer hardware and ] computer software for connection to and use of on-line services on the Internet; [ computer hardware and ] computer software for connection to computer networks, namely, the Internet; [ computer hardware and ] software for database access and searching; computer hardware and software for access control; computer hardware and software for use in cryptography; [ computer peripherals; integrated circuits; ] electronic publications, namely, catalogs, books, booklets, magazines, instruction manuals, newsletters and brochures on computer software products, upgrades for computer software products and computer accessories for others and computer software for network security, network management and network communications available on CD-Rom and available as a downloadable electronic publication; [ computer hardware and ] computer software for database management, computer programs for security management for computer networks and applications; computer programs designed to create and manage a secure computing environment; [ apparatus for searching electronic information from a global computer network or the Internet, namely, computers and personal digital hand-held computers; blank data carriers, namely, magnetic and electronic data carriers; pre-recorded data carriers, namely, magnetic and electronic data carriers featuring information for access control, authentication of identity, access to database, security network and security management; data processing equipment, namely, data processors; apparatus and equipment, namely, Internet remote access servers; Internet central security servers; apparatus and equipment for connection to computer networks, namely, computer hardware for Internet connection;] software [ and hardware ] for managing and monitoring the maintenance of the security and integrity of computer systems, local computer networks, intranet-nets, global computer networks and the Internet; [ Repair, maintenance, and installation services for computer networks hardware and computer parts; installation of security devices and equipment; repair, maintenance and installation of computers, computer hardware, computer parts, computer accessories and equipment; installation of communications and access control apparatus and equipment and computer hardware; providing information and consultation regarding the aforesaid ]; Computer network design of a secure computing environment for others; [ designing and developing computers, computer parts, computer accessories and equipment;] installation of computer software; integrating computer systems; [ computer programming services, providing integrated computer hardware for computer security using cryptography, digital signatures, smart cards and biometrics; ] computer software services, namely, developing software; integrating computer software; repair, installation and maintenance of computer software; upgrading computer software; [ computer programming for others; ] providing on-line security information in the fields of e-commerce transactions and Internet communications; providing on-line information regarding security for computer networks, access control, authentication of identity and security management for computer networks; computer services, namely, providing security management solutions for computer and computer networks; providing consultation regarding the maintenance of the security and integrity of software that runs computer systems, local computer networks, intranet-nets, global computer networks and the Internet; and providing consultation and information regarding the aforesaid
Computerized on-line ordering services in the fields of high technology, electronic commerce, cryptography, network and personal security, completed via telecommunications links, computer databases or global computer networks
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.