88959680
Jun 11, 2020
Dec 28, 2021
Active Trademark
Downloadable and recorded computer software and applications for use in issuance, management and verification of digital identities, signatures, document authentication markings and timestamps; Downloadable and recorded computer software and applications for use in data analysis, database management, transfer of information, and data authentication utilizing blockchain based platforms; Downloadable and recorded computer software for clearing, transferring, processing and managing financial transactions; Downloadable and recorded computer software and applications for providing security forensics analysis, financial security management, data loss prevention, cloud data protection, data governance, regulatory compliance monitoring, data rights management, data security, and secure storage and access to data, files and media; Downloadable and recorded computer software for use in monitoring, analyzing, auditing, managing, detecting, classifying, protecting, reporting, and securing sensitive information and data located in cloud computing environments; Computer hardware
Electrical and Scientific ApparatusScientific and industrial research, development and analysis services in the fields of information technology, data security, privacy, cryptography, artificial intelligence, and blockchain solutions; providing cryptographic software technology authentication services for digital transactions; design and development of computer hardware and software; software as a service software and applications for use in issuance, management and verification of digital identities, signatures, document authentication markings and timestamps; software as a service software and applications for use in data analysis, database management, transfer of information, and data authentication utilizing blockchain based platforms; software as a service software for clearing, transferring, processing and managing financial transactions; software as a service software and applications for providing security forensics analysis, financial security management, data loss prevention, cloud data protection, data governance, regulatory compliance monitoring, data rights management, data security, and secure storage and access to data, files and media; software as a service software and applications for providing data networking administration, data security, information protection, data loss prevention, data authentication, management of security policies, monitoring cloud services usage, controlling employee access, controlling user access, monitoring and auditing cloud services, and governance and auditing of public and private cloud services; consulting services, namely, development, implementation, testing and analysis in the fields of identification, certification, authentication, authorization and encryption hardware and software systems for computers and computer networks; platform as a service (PAAS) services featuring computer software for use in authorizing access to blockchain technology and computer and network security software; online non-downloadable computer software for use in connection with managing and validating supply chain transactions using blockchain; development, integration and operation of online and on-premise computer software and hardware systems to support issuance and management of digital certificates, signatures, timestamps and document authentication markings; technical support services, namely, providing technical advice in the fields of computer, data, email, web and network security; computer security services, namely, restricting access to and by computer networks to and of undesired websites and media; internet security services, namely, globally monitoring and collecting cybersecurity intelligence in the nature of collecting and disseminating technology information from computer networks about cyber threats and malware; providing technology information online in the fields of cybersecurity, blockchain, artificial intelligence, privacy, and digital authentication; monitoring of computer systems for security purposes, namely, providing computer security and data monitoring for tamper detection of data to identify breaches; computer security services in the nature of providing authentication, issuance, validation and revocation of digital signatures, digital certificates, timestamps, and document authentication markings; computer security services in the nature of administration of digital signatures, timestamps, digital certificates, and document authentication markings; creation and implementation of computer security service procedures, namely, providing issuance of digital certificates, signatures, timestamps and document authentication markings
Computer and Scientific