79388744
Sep 20, 2023
Provision, being the rental of telecommunications facilities and equipment; telecommunication access services; provision of access to content, websites and portals, namely, Provision of access to the internet; transmission of sound, video and information; information, consultancy and advisory services relating to telecommunications
TelecommunicationsData processing equipment and apparatus; Electronic data loggers; Authentication and access control devices, namely access control and security keys; Encoded smart cards containing programming used for authentication; Security token hardware; Radio frequency identification (RFID) credentials, namely, cards and tags, and readers for radio frequency identification credentials; Biometric identity cards; Encoded identity cards; Cards encoded with security features for identification purposes; Computer peripheral devices; Computers and computer hardware; Smart card readers; optical readers; memory card readers; electronic integrated circuit (IC) card readers; radio-frequency identification (RFID) readers; Semiconductor chips; Computer chips; Chip card readers Microcontrollers; Measuring devices, electronic, for measuring temperature, atmospheric pressure, relative air humidity, light, acceleration and other environmental variables, carbon dioxide, indoor air quality, outdoor air quality and sound; Downloadable computer software and applications for mobile devices for collecting, transmitting, processing, manipulating, analyzing and managing of data; Downloadable computer software and applications for mobile devices for identifying and authenticating users.
Electrical and Scientific ApparatusIT training services; IT consultancy services relating to installation, maintenance and repair of computer software; IT security, protection and restoration, namely, data security consultancy; data duplication being duplication of computer programs; conversion services, namely, data conversion of computer programs and data, not physical conversion; data coding services, namely, Writing of computer code; computer hardware development; software development, programming and implementation; Software as a service (SAAS) services featuring software for identifying and authenticating users; Software as a service (SAAS) services featuring software for collecting, transmitting, processing, manipulating, analyzing and managing of data; Platform as a service (PAAS) services featuring software for identifying and authenticating users; Platform as a service (PAAS) services featuring software for collecting, transmitting, processing, manipulating, analyzing and managing of data; rental of computer hardware and facilities; Electronic monitoring of personally identifying information to detect identity theft via the internet; data security services being data security consultancy; data security consultancy; internet security consultancy; computer security services for protection against illegal network access being Computer security services in the nature of administering digital keys; computer security system monitoring services, namely, Monitoring of computer system operation by remote access; Services for monitoring industrial processes, namely, monitoring of computer system operation by remote access; monitoring of computer systems for detecting unauthorized access or data breach; Telecommunication network security consultancy; Monitoring of computer systems for security purposes, namely, monitoring of computer systems for detecting unauthorized access or data breach; Computer programming services for electronic data security; Computer security threat analysis for protecting data; User authentication services using single sign-on technology for online software applications; Encryption, decryption and authentication of information, messages and data, namely, data encryption and decoding services; Electronic document and e-mail authentication services; Verification of personal identification for computer security, namely, electronic signature verification services using technology to authenticate user identity; providing authentication of personal identification information being user authentication services using single sign-on technology.
Computer and ScientificSafety evaluation, namely, security threat analysis for protecting personal safety and tangible property.
Personal