Class 009: Downloadable computer software for facilitating identity federation, multi-factor and strong authentication and access control for web, mobile and application programmable interfaces (API); Class 042: Electronic signature verification services using technology to authenticate user identity; User authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for authentication between two or more entities in the field of digital security; Software as a service (SAAS) services featuring software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interfaces (API)
Class 035: Business consulting services in the field of identity federation, multi-factor and strong authentication, access control for web, mobile, application programmable interfaces (API), and single sign-on technology for authentication between two or more entities in the field of digital security
Downloadable computer software for facilitating identity federation, multi-factor and strong authentication and access control for web, mobile and application programmable interfaces (API); Electronic signature verification services using technology to authenticate user identity; User authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for online software applications; Providing user authentication services using single sign-on technology for authentication between two or more entities in the field of digital security; Software as a service (SAAS) services featuring software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interfaces (API)
Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification; Credentialing and identity verification services, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity validation, namely, providing authentication of personal identification information via the internet; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides fraud detection services in the field of identity verification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides credentialing and identity verification, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security
Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification; Credentialing and identity verification services, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides identity validation, namely, providing authentication of personal identification information via the internet; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides fraud detection services in the field of identity verification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that provides credentialing and identity verification, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security
Downloadable computer software that facilitates verifiable credentials and identity federation in the field of digital security and identity verification | Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates verifiable credentials and identity federation in the field of digital security and identification; Credentialing and identity verification services, namely, authentication, issuance and validation of verifiable certificates and credentials for purposes of providing user authentication between two or more entities in the field of digital security
Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application | Computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity
Class 042: Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity in order to protect data stored on computers from unauthorized access; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity for the purposes of protecting data stored on computers from unauthorized access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of personal identification information via the internet; computer fraud detection services in the field of identity verification to protect data stored on computers from unauthorized access; Identity verification services, namely, providing validation of a person's verified identity in order to protect data stored on computers from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity
Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely,
downloadable computer software for building mobile applications that captures facial image data and maintains that information
securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital
security and identity verification, namely, downloadable computer software for building mobile applications that captures
government identification documents and maintains that information securely within the mobile application, none of the foregoing
relating to the provision of legal services, in particular, professional intellectual property legal services; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that
facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image;
Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that
facilitates identity verification and identity proofing to establish a real person's identity based on a form of government
identification; Identity verification services, namely, providing authentication of personal identification information, namely, a
person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized
access; identity validation services, namely, providing authentication of personal identification information, namely, a person's
verified identity for the purposes of protecting data stored on computers, including cloud-based environments, from unauthorized
access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of
personal identification information via the internet; computer fraud detection services in the field of identity verification to protect
data stored on computers, including cloud-based environments, from unauthorized access; Identity verification services, namely,
providing validation of a person's verified identity in order to protect data stored on computers, including cloud-based
environments, from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and
application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services
in the nature of restricting unauthorized access to computer systems by verifying identity, none of the foregoing relating to the
provision of legal services, in particular, professional intellectual property legal services
Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity for the purposes of protecting data stored on computers, including cloud-based environments, from unauthorized access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of personal identification information via the internet; computer fraud detection services in the field of identity verification to protect data stored on computers, including cloud-based environments, from unauthorized access; Identity verification services, namely, providing validation of a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity.
Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures facial image data and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity federation in the field of digital security and identity verification, namely, downloadable computer software for building mobile applications that captures government identification documents and maintains that information securely within the mobile application; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity for the purposes of protecting data stored on computers, including cloud-based environments, from unauthorized access; identity validation for the purposes of protecting data from unauthorized access, namely, providing authentication of personal identification information via the internet; computer fraud detection services in the field of identity verification to protect data stored on computers, including cloud-based environments, from unauthorized access; Identity verification services, namely, providing validation of a person's verified identity in order to protect data stored on computers, including cloud-based environments, from unauthorized access; computer security services, namely, restricting unauthorized access to web, mobile and application programmable interfaces (API) by providing authentication of personal identification information; cybersecurity services in the nature of restricting unauthorized access to computer systems by verifying identity.
Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences in the field of security and identity management
Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences in the field of security and identity management
Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document(s) and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user
Downloadable computer software that facilitates identity federation in the field of digital security and identity verification that is used to build mobile applications that capture facial image and government identification document(s) and maintains that information securely within the mobile application; Downloadable computer software that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user | Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity verification and proofing to establish a real person's identity based on their biometric facial image and a government identification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that that facilitates identity verification that captures personal validation information related to health records, namely, immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user | Identity verification services, namely, providing validation of one's proof of verified identity between two or more entities in the field of digital security; Identity verification services, namely, providing validation of one's proof of verified identity, namely, personal validation information related to health records and immunization and vaccination status, educational status and degree credentials, personal and real property ownership credentials, namely, deeds of ownership, insurance and employment information and status, and third party verified information about a user
Class 042: Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on their biometric facial image; Software as a service (SAAS) services, namely, services for hosting non-downloadable computer software for use by others that facilitates identity verification and identity proofing to establish a real person's identity based on a form of government identification; Class 045: Identity verification services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation services, namely, providing authentication of personal identification information, namely, a person's verified identity; identity validation, namely, providing authentication of personal identification information via the internet; fraud detection services in the field of identity verification Identity verification services, namely, providing validation of a person's verified identity
Downloadable computer software that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification; downloadable software for API traffic security; downloadable software for API activity monitoring and attack detection and reporting; downloadable security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; downloadable software for computer network security; downloadable software for cloud-based computer security; downloadable software for monitoring computer networks; downloadable software for detecting computer network intrusion; downloadable software for monitoring and maintaining network security; downloadable computer software for use in the safeguarding of network data or network services; downloadable computer software for detecting security threat; downloadable computer software for analyzing attacker behavior within computer networks; downloadable computer software for discovering, documenting, and analyzing attacker tools and methods; downloadable computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; downloadable software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; downloadable software for protecting computers and network services from attack; downloadable computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; downloadable software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; downloadable software for implementing network packet
Downloadable computer software that facilitates identity federation; multi-factor and strong authentication; access control for web, mobile and application programmable interface (API) all of the foregoing in the field of authorization policy services; directory, identity provisioning and identity administration services; identity services auditing and reporting; and other identity and access management services in the field of digital security and identity verification; Software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across hybrid clouds; software for protecting computers and network services from attack; Computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; Software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; Software for implementing network packet brokers, intrusion prevention systems and network load balancers; Software for monitoring, analyzing or reporting of network information, data, and traffic
Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification
Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the nature of Security Assertion Markup Language (SAML), OpenID Connect (OIDC), OAuth, WS-Fed, WS-Trust, Lightweight Directory Access Protocol (LDAP), System for Cross-domain Identity Management (SCIM), Fast Identity Online (FIDO), Universal Authentication Framework (UAF), FIDO Universal 2 nd Factor (U2F), Web Authentication (WebAuthn), Client-to-Authenticator Protocol (CTAP), Open Authentication (OATH) protocols for one-time password (OTP), time-based one-time password (TOTP), HMAC-based One-Time Password (HTOP), and Public Key Cryptography Standards (PKCS) in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API)
Downloadable computer software that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API), all of the foregoing in the field of authorization policy services, directory, identity provisioning and identity administration services, identity services auditing and reporting, and other identity and access management services in the field of digital security and identity verification; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication of computer users and identity verification protocols, and access control for web, mobile and application programmable interfaces (API); identity verification services, namely, providing user authentication between two or more entities using digital certificates, multi factor authentication and strong identification protocols in the nature of Security Assertion Markup Language (SAML), OpenID Connect (OIDC), OAuth, WS-Fed, WS-Trust, Lightweight Directory Access Protocol (LDAP), System for Cross-domain Identity Management (SCIM), Fast Identity Online (FIDO), Universal Authentication Framework (UAF), FIDO Universal 2nd Factor (U2F), Web Authentication (WebAuthn), Client-to-Authenticator Protocol (CTAP), Open Authentication (OATH) protocols for one-time password (OTP), time-based one-time password (TOTP), HMAC-based One-Time Password (HTOP), and Public Key Cryptography Standards (PKCS) in the field of digital security for allowing user access to web, mobile and application programmable interfaces (API)
Class 009: Software for API traffic security; software for API activity monitoring and attack detection and reporting; security software for data, applications, and computer systems accessed via API or other programmatic methods; software for reporting programmatic interface traffic activity; software for reporting API traffic activity; software for computer network security; software for cloud-based computer security; software for monitoring computer networks; software for detecting computer network intrusion; software for monitoring and maintaining network security; computer software for use in the safeguarding of network data or network services; computer software for detecting security threat; computer software for analyzing attacker behavior within computer networks; computer software for discovering, documenting, and analyzing attacker tools and methods; computer software for exporting computer security threat information and for creating attack signatures to safeguard computer networks; software for firewall protection in computer networks, monitoring incoming and outgoing data carried by a computer network, detecting and reporting computer network intrusions, and computer network security management; software for securing API traffic across private and hybrid clouds; software for protecting computers and network services from attack; Computer, network, and telecommunications software for providing active protection for network servers and network adapters by detecting packet content, detecting network traffic, recording packet content or network traffic, capturing packet content or network traffic, monitoring packet content or network traffic, filtering packet content or network traffic, attack blocking, namely, blocking or rate limiting network traffic, event management and reporting; Software for creating, centrally managing, maintaining, and executing firewall filters, content filters, and access control; Software for implementing network packet brokers, intrusion prevention systems and network load balancer; Software for monitoring, analyzing or reporting of network information, data, and traffic
Class 041: Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences
Downloadable computer software that facilitates multi-factor authentication and strong authentication in the field of digital security and identity verification; Identity verification services, namely, providing user authentication between two or more entities in the field of digital security; Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates multi-factor authentication and strong authentication in the field of digital security and identification
Class 009: Downloadable computer software that facilitates identity federation, multi-factor and strong authentication and access control for web, mobile and application programmable interface (API); Class 042: Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation, multi-factor and strong authentication, access control for web, mobile and application programmable interface (API); Class 045: Identity verification services, namely, providing user authentication between two or more entities in the field of digital security
Downloadable computer software that provides security and access control for web applications and services accessed by browsers, mobile devices, and other clients
Software as a service (SAAS) services, namely, hosting non-downloadable computer software for use by others that facilitates identity federation in the field of digital security and identification
Class 009: Downloadable computer software that facilitates identity federation in the field of digital security and identity verification; Class 042: Consulting services related to standards, processes and methods in the field of digital security and identity verification
Educational services, namely, conducting seminars, conference and workshops in the fields of security and identity management; training services in the field of security and identity management; Arranging and conducting educational conferences
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.