77314099
Oct 26, 2007
Jul 21, 2009
Active Trademark
Computer software for protecting user identity and maintaining identity integrity in the online security field;[ computer hardware;] software[ and computer hardware] for the prevention of electronic account hijacking and identity theft;[ computer peripheral apparatus and instruments; apparatus and instruments for data security, data encryption and data decryption, namely, data servers and electronic encryption units;] identity management and access control installations for use in security, namely, software for identity management and access control; [computer security apparatus, namely, login devices in the nature of electronic devices that generate and authenticate secure computer login codes; security devices for computer software and hardware, namely, access control and authentication systems in the nature of database systems to store identity credentials, input devices for entering identity information including PINs, passwords, identity tokens or biometrics; electronic apparatus and instruments for determining identity and authenticating users in electronic communications on wide area and local area networks; computer software operating programs;] computer software for protecting and securing computer networks and applications[; pre-recorded electronic, digital and magnetic media featuring user identity data; pre-recorded electronic, digital, and magnetic media featuring instructional materials relating to computers and to data; apparatus for recording, transmission or reproduction of sound or images; component parts and fittings for all the aforesaid goods]
Electrical and Scientific ApparatusDigital signature verification services provided in connection with online financial transactional and e-commerce financial services
Advertising and BusinessProvision of access to electronics communications networks; dissemination and transfer of electronic information and data via computer
Telecommunications[Computer software and hardware design, development and testing services;] updating of computer software;[ computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media] and individuals and facilities; [computer hardware and software technical support services, namely, troubleshooting of computer hardware and software problems; installation, maintenance and repair of computer software;] information, consultancy and advisory services in relation to all the aforesaid
Computer and Scientific[Computer network security services, namely, monitoring of computer systems for security purposes; online electronic security services, namely, electronic monitoring services for security purposes in the field of online monitoring in the nature of electronic monitoring of patterns of packet traffic passing through a global network;] electronic security services, namely, [monitoring networks and] online verification services for the prevention of electronic account hijacking and identity theft; digital signature verification services, namely, providing authentication of personal identification information; [data security, namely, monitoring of computer systems for security purposes;] electronic signature authorization, namely, providing authentication of personal identification information via secure storage and transmitting such information via the Internet; [computerized security services for business and domestic establishment, namely, monitoring of computer systems for security purposes; information,] consultancy and advisory services in relation to all the aforesaid
Personal