97524105
Jul 28, 2022
Downloadable application software for desktop computers, handheld computers, smart phones, embedded computer systems, namely, software for fraud activity detection in the fields of computer security, computer networks security, banking, and online advertising and commerce; Downloadable computer software and hardware for fraud activity detection in the fields of computer security, computer networks security, banking, and online advertising and commerce; Downloadable cloud computing software for fraud activity detection in the fields of computer security, computer networks security, banking, and online advertising and commerce; Downloadable cloud-based software for fraud activity detection in the fields of computer security, computer networks security, banking, and online advertising and commerce; Downloadable computer software for fraud activity detection in the fields of computer security, computer networks security, banking, and online advertising and commerce
Electrical and Scientific ApparatusComputer security services, in order to identify, verify and detect the identity, behavior, and origination of internet traffic for the purpose of preventing fraud and computer generated attacks on global computer networks in the field of computer security, computer networks security, banking, gaming, online advertising, marketing and commerce in a privacy sensitive manner; computer security services, in order to identify, verify and detect the identity, behavior, and origination of internet traffic for the purpose of detecting fraud in conjunction with electronic funds transfer, credit and debit card and electronic check transactions via a global computer network; computer security services, in order to identify, verify and detect the identity, behavior, and origination of internet traffic for the purpose of detecting fraud in conjunction with streaming services in the music and connected TV industries; computer security services, in order to identify, verify and detect the identity, behavior, and origination of internet traffic for the purpose of preventing fraud in conjunction with account takeover and credential stuffing attacks; computer security services in order to identify and prevent malicious code from being injected into online advertising and the networks through which the ads are served; computer security threat intelligence consulting and client side computer security services
Computer and Scientific