Computer hardware and peripherals; Computer networking and data communications equipment, namely, servers; Data processing equipment and accessories, namely, computer servers; data processing apparatus; interfaces for computers; Devices for encrypting, storing, analyzing, processing and transmitting data and information, namely, computer servers; Downloadable computer software used for implementing decentralized computing network for trusted third party computation with secure input and output, endorsement key, memory curtaining, protected execution, sealed storage and remote attestation; Downloadable computer software in the field of computer network security and decentralized computing for providing and accessing computing services; Downloadable computer software for analyzing, encrypting, decrypting, storing, processing and transmitting data and information; Downloadable computer software for facilitating and processing payments; Downloadable computer network security software
Electrical and Scientific ApparatusCollection, organization, analysis and systemization of business data and information; Compilation of business data and information into searchable computer databases; Business consultancy and advisory services regarding digital rights management, secure acquisition, storage, organization, analysis, processing and transmission of data, keys, algorithms, code and information, multiparty computer transactions, verification of transaction data and information, and related computer network security issues; Contract Management for others in the field of business market research and analysis; Organization of exhibitions and trade shows in the field of data security; Organization of exhibitions and trade shows in the field of decentralized computing networks for the encryption and secure transmission, storage and processing of data and information; Business services, namely, verifying the credentials of third-party contractors for market research and analysis on behalf of others
Advertising and BusinessInfrastructure as a service (IaaS), namely, cloud computing services featuring software for implementing decentralized computing networks for trusted third party computation with secure input and output, endorsement key, memory curtaining, protected execution, sealed storage and remote attestation; Platform as a service (PaaS) featuring computer software platforms for enabling trusted third party computation with secure input and output, endorsement key, memory curtaining, protected execution, sealed storage and remote attestation; Platform as a service (PaaS) featuring computer software platforms for development of applications inside a trusted computation environment with an interpreting programming language; Computer security services, namely, controlling access, monitoring, and authenticating computer resources for the protection of system security in a trusted computing environment; Software as a service (SaaS) services featuring software that enables data, keys, algorithms and code to be securely acquired, stored, organized, analyzed, processed and transmitted in a manner that maintains the privacy of the data, keys, algorithms and code in order to facilitate secure data analysis and data analytics; Software as a service (SaaS) services featuring software for developing a decentralized computing network for the secure acquisition, storage, organization, analysis, processing and transmission of data, keys, algorithms, code and information; Providing temporary use of online, non-downloadable software for acquiring, encrypting, decrypting, storing, organizing, analyzing, processing and transmitting data, keys, algorithms, code and information, and for facilitating and processing payments; Software as a service (SaaS) services featuring software for acquiring, encrypting, decrypting, storing, organizing, analyzing, processing and transmitting data, keys, algorithms, code and information, and for facilitating and processing payments; Internet based application service provider (ASP), namely, hosting, managing, developing, analyzing and maintaining data, keys, algorithms, code, applications, and software for websites of others; Computer consultation services related to securing and separating data from data analytics for maintaining the privacy and security of the data and other digital assets; Data and computer security consultancy; data conversion of electronic information; media duplication of data; Design and development of computer hardware and software; IT consultancy and advisory services; information technology (IT) consulting services; information technology consulting services; Computer security threats analysis for protecting data, keys, algorithms, code and information; Design and development of electronic data security systems; Computer security consultancy in the field of contract execution, fulfillment and verification, verification of remote computation, and payment processing and verification regarding third party transactions; Computer security services in the nature of administering digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital keys and digital certificates; Computer security services in the nature of computer virus detection and eradication; Computer services, namely, recovery of computer data; Computer services, namely, encrypted data recovery services; Data encryption services for providing security and anonymity for digital assets and rights, data, keys, algorithms, code and information; Providing online verification services of remote computations and transactions; Advisory and technical services related to digital rights management and secure processing of third party and multiparty computations; Providing remote and online verification of transactions, computations and contract fulfillment
Computer and Scientific