Wearable devices, namely, metal rings, watches, and bands, intended not as jewelry but for use with identity recognition, identity verification, and event entry purposes
Metal GoodsDownloadable computer software for issuing and managing encrypted and digitally signed and authenticated identity; computer software in downloadable form for generating and managing secure identity representation data; mobile device software in downloadable form for downloading and implementing access control functionality for identity verification and access or denial of access to digital data, physical premises or computer networks; near field communication (NFC) technology-enabled readers; physical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels; physical and logical access control systems and devices, namely, smart cards, RFID cards, NFC enabled devices, smart card readers, RFID readers, NFC readers, system control panels and door hardware; integrated circuit cards and components containing programming used for access control systems; encoded smart cards containing programming used for access control systems; electronic card readers; electronic card reader/enroller, electronic RFID card and NFC enabled device readers and controllers for controlling access to a premises; electronic lock assemblies; electronically operated high security lock cylinders; radio-frequency controlled locks; electronic locks; electronic relays; electronic switches; electronic strikes for remote control of door ingress and egress; entry and exit security portals comprised of passageways equipped with devices for identification, verification, and detection functionalities; wireless controllers to remotely monitor and control the function and status of other electrical, electronic, and mechanical devices or systems, namely, appliances, vehicles, vehicle tracking devices, energy and utility systems, security systems, and lighting systems; wearable devices, namely, magnetically encoded, and RFID tag encoded rings, watches, and bands, intended for identity recognition, identity verification, and event entry purposes, both in a peer-to-peer and centralized formats; downloadable computer software for personal detection, identity verification, and entrance into buildings, rooms, offices, secured locations, and events; ultra-wide-band technology-enabled devices, namely, RFID readers and tags, encoded identity cards and electronic card readers, computer hardware, and barcode readers intended for accessing, managing, and providing identity verification; downloadable computer software for peer-to-peer identity verification, both in internal and external software applications and hardware
Electrical and Scientific ApparatusWearable devices, namely, non-metal rings, watches, and bands, intended not as jewelry but for use with identity recognition, identity verification, and event entry purposes
Furniture and Articles not Otherwise ClassifiedData encryption services; identification verification services in the nature of authentication and validation of digital certificates in the field of personal identification information; software as a service (SaaS) featuring software for use in controlling, managing, operating, reporting, and tracking access control systems; software as a service (SaaS) featuring software for use in controlling, managing, operating, reporting, and tracking personal detection systems; software as a service (SaaS) featuring software for use in controlling, managing, operating, reporting, and tracking identity verification, and experience management for buildings, rooms, offices, secured locations, in both peer-to-peer and centralized formats
Computer and Scientific