77002798
Sep 19, 2006
Dec 14, 2010
(Based on 44(e)) Computer software and software development tools, namely, software development tools, comprised of code based computer programs, computer software used for public key encryption, certification, access control and digital rights management, verification, privacy, confidentiality and integrity of voice and text, wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware, for use in encryption, authentication and wired and wireless transmission of voice, web services and text; computer hardware for use in the encryption, decryption, authentication and wired and wireless transmission of voice, web services and text of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, computer networking, cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, certification, authentication, verification, data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone receivers, audio receivers, video receivers and data receivers, electric switches, computer networks, namely, local area networks hardware, wide area networks hardware, virtual private networks hardware, telephones, wireless computer networks, namely, networks comprised of client and server devices, namely, wireless devices in the nature of devices for wireless radio transmission, wireless network devices in the nature or wireless network extenders and their respective trust center devices, namely, integrated circuits, wireless mesh network devices, namely, computer network interface devices and their associated coordinator access points, and wireless local area network, wireless communication processors, namely, satellite processors, cellular telephony base stations, namely, cellular telephone apparatus, digital signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded and plastic smart cards, namely, electronic circuit cards with an embedded integrated circuit and stored information and data in the field of silicon semiconductors and intellectual property cores; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit or stored information and data, namely, magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit and stored information or data in the field of silicon semiconductors and intellectual property cores; plastic smart cards, namely, electronic circuit cards with an embedded integrated circuit and stored information and data; magnetically encoded credit cards
Electrical and Scientific Apparatus(Based on 44(e)) Credit cards without magnetic coding; debit cards without magnetic encoding; printed materials relating to educational and training programs in information technology, namely, educational and training books, guides, user manuals and marketing collateral, namely, advertising pamphlets
Paper Goods and Printed Matter(Based on Use in Commerce) (Based on 44(e)) Information technology services, namely, cryptographic and information security consulting; providing on-line non-downloadable computer software for systems integration relating to information security for others; design of computer systems for others; security analysis services, namely, computer security consultancy
Computer and Scientific(Based on 44(e)) Technology licensing of cryptographic methods and protocols; technology licensing of security hardware and software
Personal