K
Mark Identification

K

Serial Number

77099321

Filing Date

Feb 5, 2007

Registration Date

Jul 13, 2010

Trademark by

KRYPTIVA INC.

Classification Information

Computer software for obtaining digital signatures, applying digital signatures, certifying email, signing email, asserting a digital identity, retrieving digital identities, managing digital identities and signatures, retrieving public keys, generating requests for authentication, encryption, decryption and proof-of-delivery; computer software for processing email, email attachments and files, verifying digital signatures and digital identities; computer software for authenticating email, email senders, parties, email attachments, files, digital signatures and digital identities; computer software for encrypting and decrypting email, email attachments and files, manipulating encrypted data, triggering delivery of proof-of-delivery receipts, storing digital identities, processing results, verification results, public keys, symmetric keys and passwords, filtering email, email attachments and files, scanning data for spam and viruses, administrating digital signatures, digital identities, user information, public keys, symmetric keys and passwords, communicating with remote servers or hosts to carry out the foregoing; computer software for managing the integration and use of digital identities, certification, authentication, email signatures, encryption, decryption and proof-of-delivery in computer networks; computer software for controlling user access to signing, authentication, verification, validation, encryption, decryption, proof-of-delivery, filtering, spam-scanning and virus-scanning services, communicating with remote servers or hosts to carry out the foregoing; computer hardware for implementing the foregoing; instruction manuals in connection therewith sold as a unit with the identified computer hardware and software

Electrical and Scientific Apparatus

Computer services, namely, providing software interfaces available over various types of networks for creating digital identities, managing digital identities, obtaining digital identities, obtaining digital signatures, filtering, spam-scanning, virus-scanning, asserting digital identities, rating users with existing digital identities, generating public and private keys, signing public keys, storing public keys, obtaining public keys, validating digital identities, encryption, decryption, and requesting and generating proof-of-delivery receipts

Computer and Scientific