77592508
Oct 14, 2008
(a) Machine-assisted biometric identity confirmation systems comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document; (b) Machine-assisted service delivery systems, protection and security systems, surveillance systems, and access control systems, all comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons, and where required, to confirm a match with the human characteristics and/or behavioral traits recorded on an identification card or document or in a database to determine the rightful holder of an identification card or document; (c) Automated camera systems for use in machine-assisted biometric identification systems, service delivery systems, security and protection systems, access control systems, surveillance systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems, all using automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document; (d) Computer hardware, peripheral devices and computer software for facilitating and controlling access to, and for protecting computerized (cyber) assets, namely computer hardware, peripheral devices and computer software for capturing and recognizing human characteristics and/or behavioral traits to confirm the identity of persons attempting to access and use any computerized system, device, network or stored data, including secure access management data, transmit and receive computerized data, or access and use automated business processes and software, and to provide, where required, return receipts, certifications, verifications and/or registrations of approved accesses and use of the assets; (e) Computer hardware, peripheral devices and computer software for use in enrolling biometric details on persons; (f) Computer hardware, peripheral devices and computer software for detecting, tracking and locating persons; (g) Data processing equipment, namely optical scanners and cameras for imaging and processing identification cards and identification documents; (h) Document authentication systems comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for authenticating identification cards and/or documents by comparing human characteristics recorded on the identification cards and/or documents with human characteristics of the presenters of the identification cards or documents and/or with human characteristics stored in a database or on the identification cards or documents; (i) Computers and computer software for identity verification, namely confirming a person's identity by comparison of the person's biometric data to biometric data stored on an identification card or document or in a database; (j) Computers and computer software for identity fraud detection, namely comparing a person's biometric data to biometric data stored in a database to determine if the biometric data matches more than one person; (k) Computers and computer software for watch-list identity detection, namely comparing a person's biometric data to biometric data of individuals stored in a watch-list database and identifying potential matches; (l) Communication software for use in electronic communication, namely electronic communication of information, data, audio and images via a global communication network, via an intranet or local area network, via a wide area network, via wireless electronic communication, via telephone, via radio, via microwave transmission, and via satellite transmission
Electrical and Scientific ApparatusInstallation services, namely installation of hardware, computers and related peripheral devices for machine-assisted biometric identification systems, machine-assisted service delivery systems, protection and security systems, surveillance systems, access control systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems all using automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document
Building Construction and RepairTraining services in association with machine-assisted biometric identification systems, machine-assisted service delivery systems, protection and security systems, surveillance systems, access control systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems all using automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document
Education and EntertainmentTechnical consultation services, research and development services, design services, software and firmware installation services, integration services and technical support services all in association with machine-assisted biometric identification systems, machine-assisted service delivery systems, protection and security systems, surveillance systems, access control systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems all using automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document
Computer and Scientific