88048694
Jul 23, 2018
Computer software for monitoring and improving the security of, and detecting and protecting against cyber-attacks and threats directed at, computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Data processing equipment, computers and computer software used for the verification and authentication of personal data; Computer software for digital signatures in virtual data lockers for the purpose of cryptographic network security and data security functions on the Internet; Computer software, namely, software for data processing in connection with network security; Computer software for network security, system security, file security, data security, and personal identification security; Computer software for automating processes for authentication of identity using existing databases or partners in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication and verification of digital signatures in electronic transactions or communications, over the Internet and other computer networks
Electrical and Scientific ApparatusComputer system administration for others, namely, managing and administering a decentralized computer system for issuing identity credentials and documentation, verifying identity credentials and documentation, storing identity credentials and documentation, encrypting identity credentials and documentation, transmitting identity credentials and documentation, and tracking and monitoring transmission of identity credentials and documentation; Platform as a service (PAAS) featuring computer software platforms for enabling and managing identity credentials, identity information, identity documentation and verification of same and transmission of identity information and sensitive and/or confidential information; Providing online non-downloadable computer software for purposes of verifying individuals for computer security purposes; Providing online non-downloadable computer software for network security, system security, file security, data security, and personal identification security; Providing online non-downloadable software that gives users the ability to have an authenticated identity and identity credentials and documentation, for use in their access to and transmission of sensitive and/or confidential information; Software as Service (SAAS) services featuring software for network security, system security, file security, and data security; Software as Service (SAAS) services featuring software for management and monitoring of computer networks, systems, network connected devices, files, and data; Software as Service (SAAS) services featuring software for detection, analysis, reporting, and restoration of changes to computer networks, systems, network connected devices, applications, files, and data; Software as Service (SAAS) services featuring software for managing analyzing, and optimizing hardware and software in an information technology environment; providing online, non-downloadable software for assessing network information security vulnerability and risk; providing online, non-downloadable software for scanning and penetration testing of computers and networks to assess the risk of information security vulnerabilities, and to manage and resolve information security vulnerabilities
Computer and Scientific