87494963
Jun 19, 2017
Aug 20, 2019
Active Trademark
Computer software development tools for use in the creation of public key encryption, symmetric key encryption and cyber security vulnerability testing software; Computer software used for public key encryption, symmetric key encryption, certification of resilience to cyber security vulnerabilities, access control and digital rights management, communication verification, communication privacy, confidentiality and integrity of voice communication, e-mail, network data packets and text messages, wired and wireless transmission of voice communication, e-mail, network data packets, web services, namely, online collaboration services and virtual private networks, network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications; computer firmware and hardware, namely, for use in encryption, authentication and wired and wireless transmission of voice communication, e-mail, network data packets, web services, namely, online collaboration services and virtual private networks, and text messages; computer hardware and software for virtual private networks, public key infrastructure and data link encryptors and network data packets of encrypted information in the field of communications and authentication of encrypted information in the field of communications, device to device communication, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; Computer security software and communication software for the synchronization, transmission and sharing of voice communication, e-mail, network data packets, text messaging, video conferencing, calendar and music files between one or more electronic handheld units, namely, personal digital assistants (PDAs), wireless phones, mobile phones, cellular phones, smart phones, video phones and mobile, slate and tablet computers, wearable computing devices, namely, smart watches and smart glasses, smart home devices, namely, smart meters and home appliances with built-in capability to connect to the internet and home automation electronic security devices, home automation systems comprising wireless and wired controllers, controlled electronic home security devices and software for light, HVAC, security, safety and home monitoring, and computers that are embedded into vehicles and stored on or associated with a computer; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and digital media featuring computer software and documentation for providing encryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, computer networking, cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, certification, authentication, verification, data privacy confidentiality and data integrity; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone receivers, audio receivers, video receivers and data receivers, namely, network switches, network routers, firewalls, network connected storage devices, network connected application servers, computer networks, namely, local area networks, wide area networks, virtual private networks, cloud networks, the internet, telephones, wireless computer networks, namely, networks comprised of client and server devices, wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, radio and satellite telephones, wireless handheld computers, smartphones, network link encryption devices, namely, layer 2 link encryptors, virtual private network gateways, smart cards and hardware security modules with an embedded integrated circuit containing account and user identity information and protected with private encryption keys for purpose of authentication and secure transmission of information stored on the device; computer terminals for use with credit cards, debit cards and plastic smart cards with an embedded integrated circuit, namely, magnetic coded card readers and readers of plastic smart cards with an embedded integrated circuit; Computer software for ensuring the security of electronic mail; Computer software for encryption and cryptography; Computer software and hardware for identifying or preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; Cryptographic software featuring cryptographic algorithms; computer hardware incorporating cryptographic algorithms
Electrical and Scientific Apparatusprinted materials, namely, educational and training programs in information technology, namely, educational and training books, guides, user manuals and marketing collateral, namely, security related product promotional pamphlets
Paper Goods and Printed MatterTechnology licensing of cryptographic methods and protocols and information; technology licensing of security hardware and software
Personal