90776721
Jun 16, 2021
Apr 11, 2023
Active Trademark
Downloadable software and recorded software, for computer and mobile device user identity authentication and access management, password authentication, sign-on control, and intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Downloadable software and recorded software, for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Downloadable software and recorded software, for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Downloadable software and recorded software, for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Downloadable software and recorded software, for user identity and access authentication; Downloadable software and recorded software, and hardware, for providing computer and mobile device user identity authentication; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; downloadable software featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; downloadable software featuring a non-predictable code calculator for accessing a host data bank computer; downloadable software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources
Electrical and Scientific ApparatusSoftware as a service (SaaS) services featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Cloud computing featuring software for identity authentication and access management, password authentication, sign-on control, intrusion prevention, and for governing, provisioning, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications, websites, and cloud, mobile and network resources; Software as a service (SaaS) services featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Cloud computing featuring software for automating authentication, governance, and provisioning lifecycle of user identity and access over the internet and other computer networks; Software as a service (SaaS) services featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, websites, SaaS and cloud, and mobile and network resources; Software as a service (SaaS) services featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, and access certification; Software as a service (SaaS) services featuring software for user identity and access authentication; Cloud computing featuring software for user identity and access authentication; Software as a service (SaaS) services featuring software for providing computer and mobile device user identity authentication via a mobile application; Cloud computing featuring software for providing computer and mobile device user identity authentication via a mobile application; Software as a service (SaaS) services featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Cloud computing featuring software used by an authorized user of a computer system, computer network, website, computer resource, or computer software to authenticate user identity; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Cloud computing featuring a non-predictable code calculator for accessing computer networks, websites, computer software, and computer resources; Software as a service (SaaS) services featuring a non-predictable code calculator for accessing a host data bank computer; Cloud computing featuring a non-predictable code calculator for accessing a host data bank computer; Software as a service (SaaS) services featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources; Cloud computing featuring software for calculating the probable authenticity of computer or mobile device user identity, and either permitting access or requiring further verification as a prerequisite to access to data, websites, software applications and cloud, mobile and network resources
Computer and Scientific