OKTA, INC.
51 Marks
Corp.
First Filed:Apr 20, 2010Latest Filed:Oct 18, 2023Address:100 First Street, 6th Floor, San Francisco, CA 94105
Portfolio Overview
Registered
22(43%)Pending
4(8%)Dead
25(49%)Top Classes
Class 42
Software, IT Services & Scientific ResearchClass 9
Electronics, Software & Scientific EquipmentClass 45
Personal servicesTTAB Proceedings
Total Proceedings
25As Plaintiff
23(92%)As Defendant
2(8%)Top Firms
Loading...
Trademark Activity Timeline(2010 – 2025)
- Filings
- Registrations
Trademark Portfolio
51 results
(current & previous marks)
Refine by Mark/Description🔽
Filed
Registered
Last Activity
Filters
Ownership
51
0
Status
22
4
6
19
0
Mark Type
39
1
5
6
0
20
5
3
5
27
Goods & Services
Software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software for digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; software as a service (SaaS) services featuring software for identity verification and fraud detection and prevention
Goods & Services
Downloadable software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable software for securing communications between computers; downloadable software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable software for providing authentication of personal identification information; downloadable software for providing authentication for communications and transactions via a global computer network; downloadable software for identity verification and fraud detection and prevention
Goods & Services
Downloadable software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable software for securing communications between computers; downloadable software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable software for providing authentication of personal identification information; downloadable software for providing authentication for communications and transactions via a global computer network; downloadable software for identity verification and fraud detection and prevention; Software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software for digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; software as a service (SaaS) services featuring software for identity verification and fraud detection and prevention
Goods & Services
Downloadable software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable software for securing communications between computers; downloadable software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable software for providing authentication of personal identification information; downloadable software for providing authentication for communications and transactions via a global computer network; downloadable software for identity verification and fraud detection and prevention; Software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software for digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; software as a service (SaaS) services featuring software for identity verification and fraud detection and prevention
Goods & Services
Downloadable software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable software to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable software for securing communications between computers; downloadable software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable software for providing authentication of personal identification information; downloadable software for providing authentication for communications and transactions via a global computer network; downloadable software for identity verification and fraud detection and prevention; recorded software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; recorded software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; recorded software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; recorded software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; recorded software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; recorded software to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; recorded software for securing communications between computers; recorded software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; recorded software for providing authentication of personal identification information; recorded software for providing authentication for communications and transactions via a global computer network; recorded software for identity verification and fraud detection and prevention; Software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software for digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; software as a service (SaaS) services featuring software for identity verification and fraud detection and prevention
Goods & Services
Downloadable software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable software to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable software for securing communications between computers; downloadable software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable software for providing authentication of personal identification information; downloadable software for providing authentication for communications and transactions via a global computer network; downloadable software for identity verification and fraud detection and prevention; recorded software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; recorded software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; recorded software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; recorded software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; recorded software for identity management and identity security and for ensuring the security of computer networks, databases, computer software, software applications and software development tools; recorded software to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; recorded software for securing communications between computers; recorded software for providing user authentication services in online communications, transactions, and applications for network access control, security management and security application auditing; recorded software for providing authentication of personal identification information; recorded software for providing authentication for communications and transactions via a global computer network; recorded software for identity verification and fraud detection and prevention; Software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software for digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; software as a service (SaaS) services featuring software for identity verification and fraud detection and prevention
Goods & Services
"IDENTITY"; Software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software for digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; healthcare transaction fraud detection and prevention services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services in the nature of computer security consultancy for providers of health care services and user authentication services using single sign-on technology for online software applications for providers and users of health care services; healthcare transaction authentication and verification services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services in the nature of computer security consultancy for providers of health care services and user
Goods & Services
educational services, namely, providing of training in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, training courses, testing, and distributing course materials in connection therewith, all in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, providing training for certification of others in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; IT training services; educational services, namely, organizing and providing conferences, workshops, meetings, and seminars in the field of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management
Goods & Services
financial and insurance transaction authentication and verification services, namely, providing secure commercial transactions and access to financial data; financial and insurance advisory services in the fields of security methodology involving the identification and authentication of persons and computer systems; Providing financial information, namely providing information concerning fraud detection and prevention in the field of finance and insurance; business management consulting and advisory services; business management and consultation; business organization and promotional sponsorship of business networking, business trade show, and business conference events in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; healthcare transaction fraud detection and prevention technologies and services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services for providers and users of health care services; healthcare transaction authentication and verification services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services for providers and users of health care services; financial and insurance fraud detection and prevention technologies and services, namely, user authentication services using blockchain technology for identity verification in financial transactions and financial data
Owner:
Serial:97978223
Filed:Nov 7, 2022
Classes:35, 36, 41, +1
Registration:7504200
Registered:Sep 10, 2024
Goods & Services
educational services, namely, providing of training in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, training courses, testing, and distributing course materials in connection therewith, all in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, providing training for certification of others in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; IT training services; educational services, namely, organizing and providing conferences, workshops, meetings, and seminars in the field of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; financial and insurance transaction authentication and verification services namely, providing secure commercial transactions and access to financial data; financial and insurance advisory services in the fields of security methodology involving the identification and authentication of persons and computer systems; Providing financial information, namely providing information concerning fraud detection and prevention in the field of finance and insurance; business management consulting and advisory services; business management and consultation; business organization and promotional sponsorship of business networking, business trade show, and business conference events in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; healthcare transaction fraud detection and prevention technologies and services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services for providers and users of health care services; healthcare transaction authentication and verification services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services for providers and users of health care services; financial and insurance fraud detection and prevention technologies and services, namely, user authentication services using blockchain technology for identity verification in financial transactions and financial data
Goods & Services
downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network; healthcare transaction fraud detection and prevention technologies, namely, downloadable identification verification and fraud detection and prevention software for providers and users of health care services; financial and insurance fraud detection and prevention technologies, namely, downloadable software for identity verification in financial transactions and financial data
Goods & Services
"IDENTITY COMPANY"
Goods & Services
"IDENTITY COMPANY"
Goods & Services
downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network; healthcare transaction fraud detection and prevention technologies, namely, downloadable identification verification and fraud detection and prevention software for providers and users of health care services; financial and insurance fraud detection and prevention technologies, namely, downloadable software for identity verification in financial transactions and financial data; "IDENTITY COMPANY"
Owner:
Serial:97623217
Filed:Oct 7, 2022
Classes:9, 35, 36, +3
Registration:7423129
Registered:Jun 18, 2024
Goods & Services
educational services, namely, providing of training in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, training courses, testing, and distributing course materials in connection therewith, all in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, providing training for certification of others in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; IT training services; educational services, namely, organizing and providing conferences, workshops, meetings, and seminars in the field of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network; healthcare transaction fraud detection and prevention technologies, namely, downloadable identification verification and fraud detection and prevention software for providers and users of health care services; financial and insurance fraud detection and prevention technologies, namely, downloadable software for identity verification in financial transactions and financial data; financial and insurance transaction authentication and verification services, namely, providing secure commercial transactions and access to financial data; financial and insurance advisory services in the fields of security methodology involving the identification and authentication of persons and computer systems; Providing financial information, namely, providing information concerning fraud detection and prevention in the field of finance and insurance; business management consulting and advisory services; business management and consultation; business organization and promotional sponsorship of business networking, business trade show, and business conference events in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; providing healthcare information, namely, providing information concerning fraud detection and prevention in the field of healthcare and medicine; healthcare advisory services pertaining to security methodology involving the identification and authentication of persons and computer systems; software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products; healthcare transaction fraud detection and prevention technologies and services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services for providers and users of health care services; healthcare transaction authentication and verification services, namely, providing temporary use of on-line non-downloadable identification verification software and computer security services for providers and users of health care services; financial and insurance fraud detection and prevention technologies and services, namely, user authentication services using blockchain technology for identity verification in financial transactions and financial data

Goods & Services
downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network; "CUSTOMER IDENTITY CLOUD"

Goods & Services
"CUSTOMER IDENTITY CLOUD"; software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products

Goods & Services
"WORKFORCE IDENTITY CLOUD"; software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products

Goods & Services
downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network; "WORKFORCE IDENTITY CLOUD"

Goods & Services
educational services, namely, providing of training in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, training courses, testing, and distributing course materials in connection therewith, all in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, providing training for certification of others in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; IT training services

Goods & Services
educational services, namely, providing of training in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, training courses, testing, and distributing course materials in connection therewith, all in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; educational services, namely, providing training for certification of others in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management; IT training services; educational services, namely, organizing and providing conferences, workshops, meetings, and seminars in the field of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management

Goods & Services
downloadable mobile application computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; downloadable mobile application computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; downloadable mobile application computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; downloadable mobile application computer software for providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; downloadable mobile application computer software for identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; downloadable mobile application computer software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; downloadable mobile application computer software for securing communications between computers; downloadable mobile application computer software for providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; downloadable mobile application computer software for providing authentication of personal identification information using software technology; downloadable mobile application computer software for providing authentication using software technology for communications and transactions via a global computer network; software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; software as a service (SaaS) services featuring software featuring digital identity authentication, security management and security application auditing; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer security consultancy; computer security services, namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; computer services, namely, providing user authentication services using software technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for communications and transactions via a global computer network; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely, validating personal identification information and user credentials to secure access to online computer services and software programs and products

Goods & Services
computer security consultancy; computer security services namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data, namely, software as a service (SaaS) services featuring software for authenticating user identification; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; software as a service (SaaS) services featuring software which provides unification management, performance optimization, integration of computer systems and networks, and access of computer systems and networks, enterprise software applications, users, and internet resources; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer services, namely, providing user authentication services using software technology in online communications, e-commerce transactions, and online software applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using software technology for validating personal identification information and user credentials to securely access software programs and products; computerized identification verification services, namely, providing authentication using software technology for communications and transactions via a global computer network, namely validating personal identification information and user credentials to securely access software programs and products

Goods & Services
Cybersecurity professional services, namely, providing computer and computer network threat assessment and advisory services, computer and computer network monitoring services, deployment of computer software relating to computer and computer network security and the prevention of computer and computer network risks, remediation of computer and computer network vulnerabilities, and related consulting services; software as a service (SAAS) services featuring software for providing computer and computer network security

Goods & Services
"PACKETS"; Cybersecurity professional services, namely, providing computer and computer network threat assessment and advisory services, computer and computer network monitoring services, deployment of computer software relating to computer and computer network security and the prevention of computer and computer network risks, remediation of computer and computer network vulnerabilities, and related consulting services; software as a service (SAAS) services featuring software for providing computer and computer network security

Goods & Services
Computer security consultancy; computer security services namely, providing computer security service to verify user or machine identities, user or machine permissions, and for the management of user or machine data; providing temporary use of online non-downloadable software, namely, identity management and identity security software for use by others for ensuring the security of computer networks, databases, computer software, software applications and software development tools; providing temporary use of online non-downloadable software for use by others to manage network and database users, simplify user authentication, and control access to computer software, software applications and software development tools; software as a service (SaaS) services featuring software for securing communications between computers; software as a service (SaaS) services featuring software which provides unification, management, performance optimization, integration, and access of computer systems and networks, enterprise software applications, users, and internet resources; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications; computer services, namely, providing user authentication services using single sign-on technology in online communications, transactions, and applications for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information using single sign-on technology; computerized identification verification services, namely, providing authentication using single sign-on technology for communications and transactions via a global computer network

Goods & Services
organization and promotional sponsorship of business networking, business trade show, and business conference events in the fields of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management | educational services, namely, organizing and providing conferences, workshops, meetings, and seminars in the field of technology, information technology, computers, computer software, computer networks, and computer and online security, authentication, and identity management

Goods & Services
computer technology support services, namely, help desk services; software as a service services featuring software for a help desk messaging system that learns from previous user interactions and learns to respond to requests to the help desk automatically; provision of a website featuring technology enabling users to utilize a help desk messaging system that learns from previous user interactions and learns to respond to requests to the help desk automatically










Goods & Services
"ENTERPRISE IDENTITY"



Goods & Services
computer software for the unification, management, optimization and integration of computer systems and networks, enterprise software applications, users, and Internet resources; computer software for computer systems and network access control featuring digital identity authentication, security management and security application auditing; computer software for the monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications

Goods & Services
computer services, namely, providing user authentication services in e-commerce transactions for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication of personal identification information for network access control, security management and security application auditing; computerized identification verification services, namely, providing authentication for electronic funds transfer, credit and debit card and electronic check transactions via a global computer network for network access control, security management and security application auditing; computer services, namely, providing unification, management, performance optimization and integration of computer systems and networks, enterprise software applications, users, and internet resources; computer services, namely, monitoring, analyzing, and reporting on the performance of computer systems, networks, and enterprise software applications








