85160441
Oct 25, 2010
Computer hardware; computer software for preventing unauthorized access to computer networks, and for providing encrypted and secure data communications in computer networks, and for providing identification and authentication in computer networks, and for managing, installing, updating, and removal of software in computer networks, and for controlling of computer systems used for encrypted and secure communications
Electrical and Scientific ApparatusBusiness consultation in the field of encrypted and secure communications, identification and authentication, and of management of systems providing encrypted and secure communications; business consultation in the field of management of systems providing encrypted and secure communications
Advertising and BusinessTelecommunications, namely, providing telecommunications connections within and to a global computer network as well as within and to other network systems in the field of encrypted and secure communications; telecommunications consulting, namely, consultation in the field of encrypted and secure communications
TelecommunicationsComputer programming in the field of encrypted and secure communications; computer software design for others; installation, updating and maintenance of computer software; computer system analysis; computer consultation; computer consulting services in the field of encrypted and secure communications; data encryption and decryption services; technological consultation in the technology field of encrypted and secure communications, identification and authentication for computer hardware systems and computer software, and technological management of systems providing encrypted and secure communications; leasing of computer facilities; computer code conversion for others; computer diagnostic services; rental of computer hardware and software; integration of computer systems and networks; technical support, namely, monitoring and management of computer network systems
Computer and ScientificPreparation of identification and authentication cards, namely, encoding identification information on identification and authentication cards; providing user identification and authentication services in communications, namely, providing authentication of personal identification information; monitoring and management of computer systems for security purposes in the field of encrypted and secure communications
Personal