User authentication services using technology for e-commerce transactions; computer monitoring of personally identifying information to detect identity theft via the Internet; user authentication services using single sign-on technology for online software applications; Access control as a service (ACaaS).
Computer and Scientific