Class 009: Downloadable computer software specifically for biometric identity verification using palm vein, facial recognition, and liveness detection technology; Downloadable software for cryptographic key pair generation and management for identity authentication; Downloadable mobile application software for passwordless authentication using device-specific fingerprinting and zero-knowledge proofs; Downloadable software development kits (SDKs) specifically for implementing multi-factor authentication with mobile threat detection capabilities in banking and financial services applications; Class 036: Identity verification services for financial transaction authorization; Fraud detection services specifically for banking and financial services; Electronic verification of identity for payment processing and financial compliance; Authentication services for preventing financial fraud in banking transactions; Issuance, acceptance and orchestration of digital identity credentials and attestations for use via electronic wallets; Generation and management of QR-based credentials and communications for customer engagement within electronic wallets; Class 042: Software as a service (SaaS) featuring software specifically for biometric identity verification and anti-money laundering (AML) compliance in regulated financial industries; Platform as a service (PaaS) featuring software for know-your-customer (KYC) verification using government document authentication and liveness detection; Providing temporary use of non-downloadable software for creating cryptographic private-private key pairs for deterministic authentication; Identity verification services using biometric technology for banking and financial services compliance; Identity intelligence platform that provides an aggregate view of identity events across an ecosystem, providing visibility into user behavior and risk; Orchestration of identity events and workflows across consumer lifecycles in an organization, incorporating verification and authentication; Provision of continuous identity assurance through ongoing identity authentication and risk signals monitoring; Providing a secure communication protocol that creates a secure, encrypted communication tunnel between electronic devices, facilitating trusted interactions
downloadable software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software for use in computer, data, network and mobile device security, namely, software for use in retail POS (point of sale) systems or user authentication systems
downloadable software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software for use in computer, data, network and mobile device security, namely, software for use in retail POS (point of sale) systems or user authentication systems
downloadable software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software, namely, cybersecurity software for use in retail POS (point of sale) systems or user authentication systems; computer software for use in computer, data, network and mobile device security, namely, software for use in retail POS (point of sale) systems or user authentication systems
Downloadable and recorded software for mobile devices and desktops securing the interaction between users, customers, and clients and their computer-based business applications; Downloadable computer software for securing the interaction between users and computer-based business applications; Downloadable identity verification software to allow end-customers to scan government-issued documents combined with facial recognition biometrics and data matching; Downloadable cyber security software; Downloadable authentication server software; Downloadable mobile software application for malware detection, transaction verification, device fingerprinting, and providing access to secure channel and authentication library software; Downloadable computer security software for restricting unauthorized access to computers, computer networks, websites, computer-based applications, and for ensuring the authenticity and integrity of electronic transactions; Downloadable communications security software for electronic devices and for restricting unauthorized access to computers, computer networks, websites, computer-based applications; Downloadable software for application, transaction, and identity security related to mobile device applications for authenticating, enforcing, restricting, and controlling access to users of mobile device applications, and for ensuring the authenticity and integrity of transactions submitted by users of mobile device applications; Downloadable software for mobile device virus and malware tracking and mobile device and virus and malware remediation; Downloadable Software development kits (SDK); Downloadable Computer security Software Development Kits (SDK); Downloadable Mobile application software security development kits (SDK); Downloadable Software development kits (SDK) for authentication of user identities; Downloadable Software development kits (SDK) for biometric security software; Downloadable real-time fraud prevention software for authenticating, enforcing, restricting, and controlling access to users of mobile device applications and computer-based applications, and for ensuring authenticity and integrity of transactions submitted by users of computer-based applications; Downloadable software for monitoring, detecting, and blocking electronic transactions submitted to computer-based applications, and determination if such transactions have been modified or originate from unauthorized sources; Downloadable software for logging, monitoring, and securing of computer-based services accessible via computer networks, namely, the internet and mobile networks; Downloadable software for analyzing and detecting unusual user and transaction patterns; Downloadable behavioral analytics software for authenticating, enforcing, restricting, and controlling access to users of mobile device and web applications and computer-based applications; Downloadable software for ensuring the authenticity and integrity of transactions submitted by users of mobile device, web applications, and computer-based applications; Downloadable mobile application security software for authenticating, enforcing, restricting, and controlling access to users of mobile device and web applications and computer-based applications and for ensuring the authenticity and integrity of transactions submitted by users of mobile device and web applications and computer-based applications; Downloadable software for protecting mobile applications against cyber threats, mobile viruses, and malware, phishing attacks, man-in-the-middle attacks; Downloadable software for detecting, preventing, and reporting mobile cyber-attacks against computer-based applications; Downloadable runtime application self-protection software, namely, computer mobile malware, software; Downloadable tamper detection software, namely, software for detecting illegitimate tampering by unauthorized entities with electronic devices or software; Downloadable software for generating cryptographic keys and encryption keys for use in the field of cyber security, internet security, computer security, computer network security, and cryptography; Downloadable software for capturing, analyzing, and verifying biometric traits; Electronic apparatus, namely, downloadable computer software used to identify and authenticate users of working-from-home remote access to secure online communications and transactions; Electronic apparatus, namely, downloadable software for limiting access control to physical and virtual spaces, to electronic systems, to computers, to electronic networks, to websites, to computer based applications, and to electronic databases