86904996
Feb 11, 2016
Jan 29, 2019
Active Trademark
Security and access control software, programs and applications for use in controlling access to computers, mobile devices, computer networks and resources, and for controlling access to websites, programs, databases, computer networks and resources from computers or mobile devices
Electrical and Scientific ApparatusRental, installation and maintenance of security and access control software, programs and applications for use in controlling access to computers, mobile devices, computer networks and resources, and for controlling access to websites, programs, databases, computer networks and resources from computers or mobile devices; computer security services, namely, enforcing, restricting and controlling access privileges of users to computer networks and resources based on assigned credentials; computer security services in the nature of access privilege enforcement services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; software as a service (SAAS) services featuring software for use in access control and identity management in business to business, business to enterprise and business to consumer applications, and for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile, or network resources; platform as a service (PAAS) services featuring computer software platforms for use in access control and identity management in business to business, business to enterprise and business to consumer applications, and for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile, or network resources; and application service provider (ASP) services featuring software for use in access control and identity management in business to business, business to enterprise and business to consumer applications, and for enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile, or network resources; software as a service (SAAS) services featuring software for providing authentication, issuance, and validation of digital identity certificates for web-based software applications for computers and mobile computing devices; Platform as a service (PAAS) services featuring computer software platforms for providing authentication, issuance, and validation of digital identity certificates for web-based software applications for computers and mobile computing devices, and application service provider (ASP) services featuring software for providing authentication, issuance, and validation of digital identity certificates for web-based software applications for computers and mobile computing devices
Computer and ScientificProviding authentication, issuance, and validation of digital identity certificates for web-connected network systems, resources, and controls; providing authentication, issuance, and validation of digital identity certificates for networked security processes such as passwords, user management, and help desk management utilities; providing authentication, issuance and validation of digital identity certificates for web-connected network system users; providing authentication, issuance and validation of digital identity certificates for web-based software applications for computer and mobile computing devices; identification verification services, namely, providing authentication of personal identification information; identification verification services, namely, providing authentication of personal identification information via validation from secure storage and transmitting such information via the Internet; computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys, digital certificates, passwords, and other authentication data; computer security services in the nature of access privilege enforcement services, namely, validating the identity and access privileges of users or personnel prior to accessing computers, computer networks, or other computer resources; internet security services, namely, providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user authentication services in e-commerce transactions
Personal