Downloadable or recorded computer software for encryption and decryption, identity and access management, identity federation, and public key infrastructure (PKI) and digital certificate issuance, verification, validation, revocation and management; Downloadable or recorded computer software for searching and managing digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status; Downloadable or recorded computer software to secure interaction between and among connected devices; Downloadable or recorded computer software for secure network operations; Downloadable or recorded computer software for management of internet of things (IoT)-enabled devices and to facilitate updates and remote diagnostics of internet of things (IoT)-enabled devices; Computer hardware and computer peripherals; Central processing units (CPU); Embedded universal integrated circuit card (eUICC); SIM cards; Gateway routers in the nature of computer control hardware; Computer peripheral devices, namely, accelerators and encryptographic accelerators for data security; Tamper-resistant computer hardware for the secure management, processing, and storing of data and cryptographic keys; Communications equipment, namely, transmitters, computer network and data communications equipment in the nature of computer network hubs and wireless and cellular data transmitters for the Internet of Things and transmitting data to and from smart devices, modems, point-to-point-communications equipment in the nature of wireless and cellular modules and terminals and computer network hubs for transmitting data to and from smart devices for the Internet of Things; VPN (virtual private network) hardware; Downloadable VPN (virtual private network) operating software; Recorded content, in particular prerecorded electronic media devices featuring content relating to the Internet of Things and Internet of Things security, electronic publications, namely, electronic reports, manuals, and guides relating to smart devices, the Internet of Things, and cybersecurity
Electrical and Scientific ApparatusInstallation, customization, repair, and maintenance of computer hardware, hardware security modules, data processing systems, network systems, and Internet of Things devices; Consulting services relating to the installation, customization, repair, and maintenance of computer hardware, data processing systems, network systems, and Internet of Things devices
Building Construction and RepairTelecommunications services in the nature of telecommunication access services for machine to machine communications in the Internet of Things; Telecommunications gateway services for the Internet of Things (IoT); Providing virtual private network (VPN) services
TelecommunicationsTraining services in the field of Internet of Things (IoT), information security, cybersecurity, computer software, and computer hardware
Education and EntertainmentAuthentication, issuance, verification, revocation, and management of digital certificates; Providing online non-downloadable software for managing internal, external, or federated identity information; Providing online non-downloadable software for searching and management of digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status, digital receipts, certificate validation, encryption and permissions management services; Providing online non-downloadable software to secure interaction between and among users, computer networks, the internet, and connected devices; Providing online non-downloadable software for secure network operations; Providing online non-downloadable software for management of Internet of Things (IoT)-enabled devices and to facilitate updates and remote diagnostics of Internet of Things (IOT)-enabled devices; Providing online non-downloadable software for data analytics, namely, data aggregation, filtering and edge-analytics for Internet of Things (IOT)-enabled devices; Providing online non-downloadable software for encryption, decryption, authentication and verification of digital signatures, identity management, fraud detection, verification and management of digital keys and credentials, and public key infrastructure (PKI) and digital certificate issuance, verification, validation, revocation, and management; Providing an online, non-downloadable cloud-based enterprise authentication platform featuring flexible authentication capabilities and a broad range of authenticators, assurance levels and access controls; Providing online non-downloadable software for access control and identity authentication to control access to websites, mobile devices, kiosks, physical access control systems and other digital and physical resources and for enforcing, restricting and controlling access to cloud, mobile, or network computer resources; Computer software customization, installation, repair, support, and updating; Technical support services, namely, troubleshooting in the nature of diagnosing and repairing computer hardware and software problems; Technical support services, namely, technical consultation, advice and troubleshooting in planning, migration and implementation of software for Internet of Things security; Design and development of computer firmware; Computer and device programming for others; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the fields of information security, cybersecurity, internet of things security, computer and device programming; Computer services, namely, remote management of computer applications and information technology (IT) systems for others; Providing virtual computer systems and virtual computer environments through cloud computing; Electronic data storage; Design and development of electronic data security systems; Design and development of virtual private network (VPN) operating software; Computer services, namely, integration of computer software into multiple systems and networks
Computer and Scientific