Computer software for interpreting fingerprints or palm prints; Computer software for biometric systems for the identification and authentication of persons; Biometric identification systems comprised of computer software and systems for identifying individuals based on their biometric characteristics; Authentication software for identification and verification of individuals and legal entities
Electrical and Scientific ApparatusIssuing of electronic identity documents to individuals for the purpose of enabling businesses to verify customer identities
Transportation and storageInternet security consultancy; Research in the field of data processing technology; Research in the field of information technology; Authentication of pictures; Information technology consulting services; Consultancy in the field of data security; Design and development of electronic data security systems; Design and development of data storage systems; Development and testing of computing methods, algorithms and software; Computer security services in the nature of providing authentication of user identities; Providing user authentication services using single sign-on technology for online software applications; Providing user authentication services using biometric hardware and software technology for e-commerce transactions
Computer and ScientificMonitoring of security systems to prevent unauthorized access; Opening of door locks; Opening of security locks; Personal background investigations; Pre-employment background screening; Pre-employment background investigation services; Security services for the protection of individuals and property, namely, providing identity verification services to prevent unauthorized access to computer systems; Identity verification services, namely, verification of personal identity to prevent unauthorized access to computer systems; Identity validation services, namely, validation of personal identity to prevent unauthorized access to computer systems; Providing authentication of personal identification information to prevent unauthorized access to computer systems; Providing background check services, namely, background investigation services; Monitoring of computer systems for security purposes to prevent unauthorized access
Personal