77099321
Feb 5, 2007
Jul 13, 2010
Computer software for obtaining digital signatures, applying digital signatures, certifying email, signing email, asserting a digital identity, retrieving digital identities, managing digital identities and signatures, retrieving public keys, generating requests for authentication, encryption, decryption and proof-of-delivery; computer software for processing email, email attachments and files, verifying digital signatures and digital identities; computer software for authenticating email, email senders, parties, email attachments, files, digital signatures and digital identities; computer software for encrypting and decrypting email, email attachments and files, manipulating encrypted data, triggering delivery of proof-of-delivery receipts, storing digital identities, processing results, verification results, public keys, symmetric keys and passwords, filtering email, email attachments and files, scanning data for spam and viruses, administrating digital signatures, digital identities, user information, public keys, symmetric keys and passwords, communicating with remote servers or hosts to carry out the foregoing; computer software for managing the integration and use of digital identities, certification, authentication, email signatures, encryption, decryption and proof-of-delivery in computer networks; computer software for controlling user access to signing, authentication, verification, validation, encryption, decryption, proof-of-delivery, filtering, spam-scanning and virus-scanning services, communicating with remote servers or hosts to carry out the foregoing; computer hardware for implementing the foregoing; instruction manuals in connection therewith sold as a unit with the identified computer hardware and software
Electrical and Scientific ApparatusComputer services, namely, providing software interfaces available over various types of networks for creating digital identities, managing digital identities, obtaining digital identities, obtaining digital signatures, filtering, spam-scanning, virus-scanning, asserting digital identities, rating users with existing digital identities, generating public and private keys, signing public keys, storing public keys, obtaining public keys, validating digital identities, encryption, decryption, and requesting and generating proof-of-delivery receipts
Computer and Scientific