97910748
Apr 27, 2023
(Based on Use in Commerce) Authentication of data in the field of e-commerce and digital payments using blockchain technology; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer programming services; Computer programming services for the protection of software; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer software development; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Consultancy in the design and development of computer hardware; Consultation services relating to computer software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Data security consultancy; Design and development of computer game software and virtual reality software; Design and development of operating software for accessing and using a cloud computing network; Design and development of wireless communication systems for transmission and reception of voice, data and video; Installation, maintenance and repair of computer software; Leasing of computers; Monitoring of computer systems for detecting unauthorized access or data breach; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Platform as a service (PAAS) featuring computer software platforms for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing a secure electronic online system featuring technology which allows data authentication via blockchain; Providing a secure electronic online system featuring technology which allows data storage via blockchain; Providing a secure electronic online system featuring technology which allows blockchain as a service; Providing a secure electronic online system featuring technology which allows digital asset management; Providing a secure electronic online system featuring technology which allows user authentication services using blockchain technology; Providing a secure electronic online system featuring technology which allows access to digital assets; Providing on-line non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing on-line non-downloadable software for managing computer compliance; Providing on-line non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable software and applications for enabling the collection of non-fungible tokens registered on a blockchain; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of non-fungible tokens for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of cryptographic keys for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for cryptographic keys for receiving and sending crypto assets; Providing temporary use of on-line non-downloadable software and applications for managing downloadable digital files authenticated by non-fungible tokens; Providing temporary use of on-line non-downloadable software and applications for accessing digital assets; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cybersecurity on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of payment tokens on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cryptocurrency on a blockchain; Rental of computers relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for for IT infrastructure and cybersecurity automation; Software as a service (SAAS) services featuring software for securing users, and security policies; Software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; Software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; Software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; Software as a service (SAAS) services featuring software for computer network and computer system security; Technical advice relating to operation of computers; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Technology consultation in the field of cybersecurity; Troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks; User authentication services using blockchain technology for cybersecurity(Based on 44(d) Priority Application) Authentication of data in the field of e-commerce and digital payments using blockchain technology; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer programming services; Computer programming services for the protection of software; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer software development; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Consultancy in the design and development of computer hardware; Consultation services relating to computer software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Data security consultancy; Design and development of computer game software and virtual reality software; Design and development of operating software for accessing and using a cloud computing network; Design and development of wireless communication systems for transmission and reception of voice, data and video; Installation, maintenance and repair of computer software; Leasing of computers; Monitoring of computer systems for detecting unauthorized access or data breach; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Platform as a service (PAAS) featuring computer software platforms for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing a secure electronic online system featuring technology which allows data authentication via blockchain; Providing a secure electronic online system featuring technology which allows data storage via blockchain; Providing a secure electronic online system featuring technology which allows blockchain as a service; Providing a secure electronic online system featuring technology which allows digital asset management; Providing a secure electronic online system featuring technology which allows user authentication services using blockchain technology; Providing a secure electronic online system featuring technology which allows access to digital assets; Providing on-line non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing on-line non-downloadable software for managing computer compliance; Providing on-line non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable software and applications for enabling the collection of non-fungible tokens registered on a blockchain; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of non-fungible tokens for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of cryptographic keys for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for cryptographic keys for receiving and sending crypto assets; Providing temporary use of on-line non-downloadable software and applications for managing downloadable digital files authenticated by non-fungible tokens; Providing temporary use of on-line non-downloadable software and applications for accessing digital assets; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cybersecurity on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of payment tokens on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cryptocurrency on a blockchain; Rental of computers relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for for IT infrastructure and cybersecurity automation; Software as a service (SAAS) services featuring software for securing users, and security policies; Software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; Software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; Software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; Software as a service (SAAS) services featuring software for computer network and computer system security; Technical advice relating to operation of computers; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Technology consultation in the field of cybersecurity; Troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks; User authentication services using blockchain technology for cybersecurity(Based on 44(e)) Authentication of data in the field of e-commerce and digital payments using blockchain technology; Cloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer programming services; Computer programming services for the protection of software; Computer security consultancy; Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, remote and on-site management of the information technology (IT) cloud computing systems of others; Computer software development; Computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Computer virus protection services; Consultancy in the design and development of computer hardware; Consultation services relating to computer software; Consulting services in the design and implementation of computer-based information systems for businesses; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Data security consultancy; Design and development of computer game software and virtual reality software; Design and development of operating software for accessing and using a cloud computing network; Design and development of wireless communication systems for transmission and reception of voice, data and video; Installation, maintenance and repair of computer software; Leasing of computers; Monitoring of computer systems for detecting unauthorized access or data breach; Outsource service provider in the field of information technology consulting relating to installation, maintenance and repair of computer software; Outsource service providers in the field of information technology relating to installation, maintenance and repair of computer software; Platform as a service (PAAS) featuring computer software platforms for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing a secure electronic online system featuring technology which allows data authentication via blockchain; Providing a secure electronic online system featuring technology which allows data storage via blockchain; Providing a secure electronic online system featuring technology which allows blockchain as a service; Providing a secure electronic online system featuring technology which allows digital asset management; Providing a secure electronic online system featuring technology which allows user authentication services using blockchain technology; Providing a secure electronic online system featuring technology which allows access to digital assets; Providing on-line non-downloadable software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Providing on-line non-downloadable software for managing computer compliance; Providing on-line non-downloadable software for use in Internet content filtering, secure Internet content management, Internet content-checking, and data content checking; Providing temporary use of on-line non-downloadable software and applications for enabling the collection of non-fungible tokens registered on a blockchain; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of non-fungible tokens for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for enabling the generation of cryptographic keys for use in online virtual environments and the metaverse; Providing temporary use of on-line non-downloadable software and applications for cryptographic keys for receiving and sending crypto assets; Providing temporary use of on-line non-downloadable software and applications for managing downloadable digital files authenticated by non-fungible tokens; Providing temporary use of on-line non-downloadable software and applications for accessing digital assets; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cybersecurity on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of payment tokens on a blockchain; Providing temporary use of on-line non-downloadable software for accessing, reading, and tracking information in the field of cryptocurrency on a blockchain; Rental of computers relating to computer security and prevention of computer risks; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for for IT infrastructure and cybersecurity automation; Software as a service (SAAS) services featuring software for securing users, and security policies; Software as a service (SAAS) services featuring software for visualizing users, security policies, computer systems, computer networks, and traffic flow; Software as a service (SAAS) services featuring software for detecting anomalies of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for automated monitoring of users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for providing security and compliance reports about users, security policies, computer systems, and computer networks; Software as a service (SAAS) services featuring software for network asset inventory management; software as a service (SAAS) services featuring software for conducting security and compliance assessments; Software as a service (SAAS) services featuring software for enforcing, restricting and controlling access privileges of users; Software as a service (SAAS) services featuring software for computer network and computer system security; Technical advice relating to operation of computers; Technical support services, namely, 24/7 monitoring of network systems, servers and web and database applications and notification of related events and alerts; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Technical support services, namely, troubleshooting of computer software problems; Technical support, namely, monitoring technological functions of computer network systems; Technology consultation in the field of cybersecurity; Troubleshooting of computer software problems; Updating of computer software relating to computer security and prevention of computer risks; User authentication services using blockchain technology for cybersecurity
Computer and Scientific