Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for securing and protecting electronic communications; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for user identity authentication; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for website security; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for password and personal identity information access and management;; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for providing a scoring system for rating 3rd party website on the level of security; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for securing and encrypting data; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for user identification, authentication, and verification with integrated multi-factor authentication; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for facilitate multi-factor authentication; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for detecting malicious cyber activity; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for blocking cyber attacks; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for transaction verification; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for enhancing website privacy and security; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for combining user identity data with transaction data; Downloadable computer application software for mobile phones, tablets, handheld computers, smart watches, portable media players, and computers, namely, software for secure management of digital wallets; Downloadable computer software for computer system and application development, deployment and management; Downloadable software for ensuring the security of electronic mail; Downloadable software for website security; Downloadable software for user identity authentication; Downloadable software for secure management of digital wallets; Downloadable software for combining user identity data with transaction data; Downloadable software for enhancing website privacy and security; Downloadable software for password and personal identity information access and management;; Downloadable software for encrypting data; Downloadable software for blocking cyber attacks; Downloadable software for detecting malicious cyber activity; Downloadable software for protecting identities and online identities of users; Downloadable software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, non-fungible tokens (nfts), metaverse avatars, virtual reality (vr) assets, augmented reality (ar) assets, metaverse assets; Downloadable software for providing a scoring system for rating 3rd party website on the level of security; Downloadable software for use as a website plugin; Downloadable computer software for encryption; Downloadable computer software for managing and verifying financial transactions; Downloadable application programming interface (API) software; Downloadable anti-spyware software; Downloadable computer software for use as an application programming interface (API); Recorded anti-spyware software
Electrical and Scientific ApparatusApplication service provider featuring application programming interface (API) software; Computer programming; Computer software design; Computer software design and updating; Computer software design, computer programming, and maintenance of computer software; Computer software development, computer programming and maintenance of computer software for website security; Computer software development, computer programming and maintenance of computer software for user identity authentication; Computer software development, computer programming and maintenance of computer software for password and personal identity information access and management;; Computer software development, computer programming and maintenance of computer software for providing a scoring system for rating 3rd party website on the level of security; Computer software development, computer programming and maintenance of computer software for securing and protecting electronic communications; Computer software development, computer programming and maintenance of computer software for securing and encrypting data; Computer software development, computer programming and maintenance of computer software for enhancing website privacy and security; Software design and development; Computer software development; Computer software consulting; Developing and updating computer software; Providing temporary use of non-downloadable computer software for tracking freight over computer networks, intranets and the internet; Software as a service (SAAS) services featuring software for user identity authentication; Software as a service (SAAS) services featuring software for securing user identity; Software as a service (SAAS) services featuring software for securing digital assets; Software as a service (SAAS) services featuring software for securing online transactions; Software as a service (SAAS) services featuring software for securing electronic commerce transactions; Software as a service (SAAS) services featuring software for opening or creating new accounts; Software as a service (SAAS) services featuring software for protecting identities and online identities of users; Software as a service (SAAS) services featuring software for securing user data; Software as a service (SAAS) services featuring software for transaction verification; Software as a service (SAAS) services featuring software for detecting malicious cyber activity; Software as a service (SAAS) services featuring software for detecting fraudulent transactions; Software as a service (SAAS) services featuring software for blocking a suspicious transaction; Software as a service (SAAS) services featuring software for tokenizing user identity data with transaction data; Software as a service (SAAS) services featuring software for combining user identity data with transaction data; Software as a service (SAAS) services featuring software for blocking cyber attacks; Software as a service (SAAS) services featuring software for providing cybersecurity protection; Software as a service (SAAS) services featuring software for online identity protection; Software as a service (SAAS) services featuring software for secure file sharing; Software as a service (SAAS) services featuring software for secure management of digital wallets; Software as a service (SAAS) services featuring software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, non-fungible tokens (nfts), metaverse avatars, virtual reality (vr) assets, augmented reality (ar) assets, metaverse assets; Software as a service (SAAS) services featuring software for preventing biometric fraud; Software as a service (SAAS) services featuring software for enhancing and managing web browser software and personal identity information; Software as a service (SAAS) services featuring software for user identity authentication and computer access management; Software as a service (SAAS) services featuring software for authentication of authorized users of a computer system; Software as a service (SAAS) services featuring software for password and personal identity information access and management;; Software as a service (SAAS) services featuring software for user identification, authentication, and verification with integrated multi-factor authentication; Software as a service (SAAS) services featuring software for facilitate multi-factor authentication; Software as a service (SAAS) services featuring software for providing a scoring system for rating 3rd party website on the level of security; Software as a service (SAAS) services featuring software for encrypting data; Software as a service (SAAS) services featuring software for anti-spyware; Software as a service (SAAS) services featuring software for securing and protecting electronic communications
Computer and Scientific