Computer software for encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer software for security, encryption, digital signatures, authentication, fraud detection, secure e-mails and secure socket layer (SSL) certificate management across operating environments, multiple platforms and net protocols, websites and mobile devices; Computer software to enable users to perform electronic business transactions via a global computer network; Computer software for creating, protecting, encrypting, transmitting, analyzing, filtering, delivering and authenticating secure e-mails; Computer software for searching and managing digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status; Computer software for use in secure socket layer (SSL) encryption; Computer software for providing network, internet, e-mail and computer security; Computer software for monitoring and control of computer and online activity; Computer software for providing online transaction security; Privacy control software
Electrical and Scientific ApparatusComputer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile, or network resources based on assigned credentials; Software as a service (SAAS), platform as a service (PAAS), and application service provider (ASP) services featuring software for use in access control and identity management, for providing authentication, issuance, validation and revocation of digital identity certificates for web-based software applications for computers and mobile computing devices, and for enforcing, restricting and controlling access to cloud, mobile, or network computer resources based on assigned credentials; Software as a service (SAAS) services featuring software for information security, encryption, decryption and authentication of data, digital signatures, authentication, fraud detection, secure e-mail, secure socket layer (SSL) certificate management, authentication, issuance, validation, revocation and management of digital certificates, and for the verification and management of digital keys and credentials; Providing on-line non-downloadable software for public key infrastructure (PKI) and certificate management enabling the use of digital signatures, digital receipts, certificate validation, encryption and permissions management services; Providing on-line non-downloadable software for searching and management of digital certificates from multiple digital certificate authorities and providing information to track their location, expiration, purpose or status; Computer software installation, integration and deployment services in the field of information security
Computer and ScientificComputer network identification verification and authentication services, namely, verification and authentication of personal identification and credentials; Computer security services in the nature of providing verification, authentication, issuance, validation and revocation of digital certificates; Providing user authentication services in electronic transactions and communications; Providing authentication, issuance, and validation of digital identity certificates for web-based software applications for computers and mobile computing devices and for web-connected network systems, resources and controls; Providing authentication, issuance, and validation of digital identity certificates for networked security processes such as passwords, user management, and help desk management utilities; Computer services, namely, providing digital certificates that authenticate the identity of web sites and encrypt information sent to the server using secure socket layer (SSL) technology; Internet security services, namely, public key infrastructure ("PKI") verification and authentication; Authorization services in the nature of authorizing users of and applications to network resources; Digital receipts, digital signature, certificate validation, encryption and permissions management services; Consulting services in the field of Internet and information security
Personal