75852474
Nov 17, 1999
Jan 1, 2002
Active Trademark
[COMPUTER HARDWARE AND SOFTWARE, namely, COMPUTER NETWORK SECURITY SOFTWARE; COMPUTER SOFTWARE FOR NETWORK IDENTIFICATION AND AUTHENTICATION, OUTSIDE ACCESS TO THE NETWORK, DATA ENCRYPTION AND DECRYPTION, IDENTIFICATION OF PERSONS BY STORED IMAGES RECORDED ON SMARTCARDS, PASSWORD PROTECTION FOR ACCESS TO NETWORKS, COMPUTER PROGRAMS AND COMPUTER FILES, AND SECURITY FOR COMMUNICATIONS BETWEEN NETWORK USERS AND PUBLIC NETWORKS SUCH AS THE INTERNET; COMPUTER HARDWARE AND SOFTWARE FOR USE AS AN INTERNET FIREWALL THAT IS USED TO PROTECT USER ACCESS FROM AN UNTRUSTED NETWORK TO A TRUSTED NETWORK, USING INTEGRATED AUTHENTICATION TOKENS FOR A CHALLENGE/RESPONSE LOGON AS WELL AS ENCRYPTION FOR FILES ON DESKTOP AND LAPTOP COMPUTERS; COMPUTERS LOADED WITH THE FOREGOING SOFTWARE]
Electrical and Scientific ApparatusMANAGEMENT CONSULTING SERVICES, NAMELY, ADVISING TELECOMMUNICATIONS CUSTOMERS IN THE PLANNING, IMPLEMENTING, OPERATING, MANAGING AND STAFFING OF TELECOMMUNICATIONS NETWORKS
Advertising and BusinessPROVIDING TELECOMMUNICATIONS CONNECTIONS TO A GLOBAL COMPUTER NETWORK; TELECOMMUNICATIONS GATEWAY SERVICES; ELECTRONIC MAIL SERVICES; TELECOMMUNICATION SERVICES NAMELY, INTERCONNECTION SWITCHING AND OPERATING SERVICES FOR THE AUTHENTICATION OF TELEPHONE ACCESS; PROVIDING MULTIPLE-USER ACCESS TO THE INTERNET FOR THE TRANSFER AND DISSEMINATION OF A WIDE RANGE OF INFORMATION
Telecommunications[COMPUTER SERVICES, namely, OPERATING COMPUTER NETWORKS AND PROVIDING COMPUTER NETWORK SECURITY SERVICES; PROVIDING ENCRYPTION AND SECURED TRANSACTION SECURITY SERVICES FOR USERS OF TELECOMMUNICATIONS NETWORKS; DEVELOPMENT AND IMPLEMENTATION OF COMPUTER NETWORK SYSTEMS AND COMPUTER NETWORK SECURITY SYSTEMS FOR OTHERS AND CONSULTING THEREWITH; TELECOMMUNICATIONS NETWORK SECURITY IN THE NATURE OF TRAFFIC MONITORING, ANALYSIS, FRAUD PREVENTION AND CUSTOMER NOTIFICATION SERVICE; COMPUTER AND DATA NETWORKING SERVICES, namely, PROVIDING PERFORMANCE ENGINEERING, CONFIGURATION MANAGEMENT, MONITORING AND FAULT MANAGEMENT, INFORMATION MANAGEMENT AND REPORTING, SOFTWARE CONTROL, NETWORK SECURITY, AND COORDINATION OF THE IMPLEMENTATION OF A NETWORK; ONLINE ACCESS MONITORING SERVICES, namely, RESTRICTING AND MONITORING ACCESS TO UNAUTHORIZED AREAS IN THE INTERNET OR ANY OTHER PUBLICLY ACCESSIBLE COMPUTER NETWORK FOR THE PURPOSE OF PROMOTING SECURITY AND THE COMPUTER USER'S PRODUCTIVITY; MANAGING AND MAINTAINING A SECURE ENVIRONMENT THROUGH THE USE OF PORT AND IP ADDRESS MAPPING TO PREVENT UNAUTHORIZED INTRUSION AND PRESENT THE SECURE NETWORK TO THE INTERNET; COMPUTER NETWORK SECURITY MANAGEMENT SERVICES, namely, PROVIDING SECURITY ASSESSMENTS; COORDINATION OF THE IMPLEMENTATION OF A SECURITY POLICY; MONITORING AND MANAGING COMPUTER NETWORK CONNECTIONS, SECURITY SYSTEMS, FIREWALLS, AND DETECTION SYSTEMS TO PREVENT UNAUTHORIZED INTRUSION ATTEMPTS; CONDUCTING VULNERABILITY TESTS; AND REPORTING SECURITY VIOLATIONS AND ATTEMPTED VIOLATIONS; DESIGN FOR OTHERS AND MAINTENANCE OF COMPUTER PROGRAMS TO MANAGE, OPERATE AND MAINTAIN TELECOMMUNICATIONS SYSTEMS AND TELECOMMUNICATIONS NETWORKS; COMPUTER SERVICES, namely, DESIGNING AND IMPLEMENTING WEB SITES FOR OTHERS; COMPUTER NETWORK ACCESS, ADMINISTRATION AND SUPPORT SERVICES, namely, ASSISTING OTHERS IN THE DESIGN OF COMPUTER NETWORK SITES; ASSISTING OTHERS IN THE OPERATION AND MAINTENANCE COMPUTER SOFTWARE AND PROVIDING COMPUTER PROGRAMMING FOR OTHERS; AND INTEGRATION OF COMPUTER SYSTEMS AND NETWORKS]
Computer and Scientific