Integrated security services platform; recorded or downloadable software for monitoring security events; recorded or downloadable embedded security software; cloud-based solution for remotely supply, deploy and manage embedded systems, embedded security of electronic devices, update firmware and monitor security events in real-time; computer programs downloadable, computer programs recorded, computer software applications downloadable, computer software platforms recorded or downloadable, computer software recorded, data sets recorded or downloadable, downloadable cryptographic keys for receiving and spending crypto assets, integrated circuit cards [smart cards] / smart cards [integrated circuit cards], integrated circuits, security tokens [encryption devices]; Downloadable software using artificial intelligence to detect anomalies; Downloadable software using artificial intelligence to detect intrusions
Electrical and Scientific Apparatuslicensing of patented technology to others; computer system design; computer software design; installation of computer software; installation of computer system; computer system analysis; computer programming services for data processing, computer software design, computer system analysis, computer system design, data encryption services, design of computer-simulated models, design of prototypes, engineering, maintenance of computer software, monitoring of computer system operation by remote access, monitoring of computer systems for detecting unauthorized access or data breach, monitoring of computer systems to detect breakdowns, platform as a service [PaaS], providing online non-downloadable computer software, research in the field of artificial intelligence technology, software as a service [SaaS], technological research, scientific research, updating of computer software, writing of computer code; Providing online non-downloadable computer security software that uses artificial intelligence algorithms to detect anomalies; Providing online non-downloadable Computer security software that uses artificial intelligence algorithms to detect intrusions; Protection services for computer systems using artificial intelligence; Computer vulnerability analysis and security services based on artificial intelligence; Data analysis services for cybersecurity using artificial intelligence.
Computer and Scientific