Telecommunications Services (SMS-Only Future-Proof) Encrypted transmission of short message service (SMS) and successor carrier-native messaging standards between SMS-capable devices over existing telecommunications carrier networks; providing secure, verified delivery of such communications without the use of internet-based protocols or requiring modification to existing telecommunications infrastructure, using a proprietary encryption and verification protocol.
TelecommunicationsAuthentication / Security Services Providing authentication, verification, and security services for delivery of short message service (SMS) and successor carrier-native messaging standards over telecommunications carrier networks, including satellite relay and hybrid pathways; namely, verifying sender identity, message integrity, and delivery confirmation between SMS-capable devices using encryption, without requiring modification to existing telecommunications infrastructure or use of internet-based protocols.
PersonalDownloadable Software (with Financial Exclusion) Downloadable software for encrypting, decrypting, and verifying delivery of short message service (SMS) and successor carrier-native messaging standards between SMS-capable devices over existing telecommunications carrier networks; providing such functions without the use of internet-based protocols or requiring modification to existing telecommunications infrastructure, using a proprietary encryption and verification protocol; all of the foregoing excluding software primarily for financial-market data, sanctions screening, anti-money-laundering compliance, or financial-regulatory risk assessment
Electrical and Scientific ApparatusSaaS / Non-Downloadable Software Providing temporary use of non-downloadable software for encrypting, decrypting, and verifying delivery of short message service (SMS) and successor carrier-native messaging standards between SMS-capable devices over existing telecommunications carrier networks; delivering such functions without the use of internet-based protocols or requiring modification to existing telecommunications infrastructure, using a proprietary encryption and verification protocol.
Computer and Scientific