| Goods and Services | Computer hardware and computer peripherals; Computer hardware and computer peripheral devices; Computer peripherals; Computer chips; Computer networking hardware; Computer network adapters; Computer hardware for communicating audio, video and data between computers via a global computer network, wide-area computer networks, and peer-to-peer computer networks; Computer hardware for telecommunications; USB computer security key; Computer network interface devices; Computer hardware and peripherals; USB computer access control key; Computer hardware and peripheral devices; Computer hardware and peripherals therefor; Computer peripherals and parts thereof; Computers and computer peripheral devices; Dongles being computer hardware for preventing the unauthorized copying or use of computer software; Downloadable communications software for connecting computer networks; Computer hardware for wireless content delivery; Computer hardware with embedded operating system software; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer software for authorising access to data bases; Computer hardware; Computer peripheral equipment; Computer peripheral devices; Wireless computer peripherals; Computers and computer hardware; Downloadable computer programs for connecting remotely to computers or computer networks; Downloadable computer software for computer system and application development, deployment and management; Downloadable computer software for encryption; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Computer hardware for cybersecurity, encryption and communications; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Downloadable computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; Computer hardware with preinstalled software for cybersecurity and encryption; Downloadable computer application software for mobile phones, namely, software for encryption and cybersecurity; Downloadable computer software and firmware for cybersecurity and encryption; Micro-computers; Mobile computers; Handheld computers; Microprocessors; Wireless adapters for computers; Communications servers; Handheld personal computers; Wireless adapters used to link computers to a telecommunications network; Electronic encryption units; Downloadable computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files |
| Goods and Services | Computer software design, computer programming, and maintenance of computer software; Computer programming and computer system analysis; Computer programming; Development of computer codes, computer platforms and computer programs for others; Computer programming and maintenance of computer programs; Updating of computer software relating to computer security and prevention of computer risks; Maintenance of computer software relating to computer security and prevention of computer risks; Computer systems analysis; Customizing computer software; Developing computer software; Computer software development; Computer system design; Computer system analysis; Computer software consulting; Computer software consultation; Computer security consultancy; Computer software consultancy; Computer programming for others; Creating of computer programs; Upgrading of computer software; Computer network security consultancy; Computer chip design services; Computer software development, computer programming and maintenance of computer software for encryption; Computer programming services, namely, encryption; Computer software design for others; Writing and updating computer software; Computer programming and software design; Computer software installation and maintenance; Developing and updating computer software; Computer software design and updating; Computer hardware and software design; Computer software design and development; Computer security consultancy in the field of communications; Services for maintenance of computer software; Design and writing of computer software; Computer programming services for encryption and security; Creating, maintaining, and modernizing computer software; Research and development of computer software; Design and development of computer hardware; Design and development of computer software; Programming of computer software for others; Updating and design of computer software; Design and development of computer firmware; Maintenance and updating of computer software; Maintenance and upgrading of computer software; Updating and maintenance of computer software; Consultation services relating to computer software; Installation and maintenance of computer software; Advisory services relating to computer software; Computer software applications design and development; Development of computer programs for others; Development of computer programmes for others; Writing of computer software for others; Design and programming of computer software; Design of computer hardware, integrated circuits, communications hardware and software and computer networks for others; Computer security services, namely, restricting unauthorized access to communications; Installation, maintenance, and updating of computer software; Technical advisory services relating to computer programs; Computer security threat analysis for protecting data; Installation, repair and maintenance of computer software; Installation, maintenance and repair of computer software; Design and development of computer software applications; Research in the field of computer software; Design, programming, and writing of computer software; Design, programming, and maintenance of computer programs; Research, development, and design of computer software; Advice relating to the design of computer hardware; Design, maintenance, development and updating of computer software; Research, development, design and upgrading of computer software; Design and development of computer hardware and software; Design, development, installation and maintenance of computer software; Design, installation, updating and maintenance of computer software; Preparation, update, installation and maintenance of computer software; Monitoring of computer systems to detect cybersecurity incidents; Information technology consulting relating to computer network design; Information technology consulting relating to computer software design; Design, programming, and maintenance of computer software platforms; Research, development, design and upgrading of computer programs; Document data transfer from one computer format to another; Planning, design and implementation of computer technologies for others; Computer software development in the field of mobile applications; Computer project management services in the field of telecommunications; Leasing of computer hardware and computer peripheral equipment for use in communications and encryption; Computer security services, namely, restricting unauthorized access to peripherals and communication devices; Periodic upgrading of computer software for others; Installation, maintenance and repair of software for computer systems; Consultation about the maintenance and updating of computer software; Design for others in the field of computer software; Consultancy in the design and development of computer hardware; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services in the nature of administering digital keys; Computer security services in the nature of administering digital certificates; Scientific and technological services, namely, research and design in the field of encryption and communications.; Consulting services in the field of computer hardware design for others; Computer software development in the field of encryption, communications, and security.; Cybersecurity services in the nature of restricting unauthorized access to computer systems; Providing technical information in the field of maintenance of computer software platforms; IT consulting services relating to installation, maintenance and repair of computer software; Information technology consultancy relating to installation, maintenance and repair of computer software; Writing of computer programmes for encryption; Computer software design; Computer hardware design; Computer hardware development; Computer design services; Computer systems design; Computer software development and computer programming development for others; Testing of computer hardware; Writing of computer code; Design of computer languages; Design of computer chips; Development of computer platforms; Computer software design services; Programming of computer software; Design of computer software; Writing of computer programmes; Writing of computer programs; Computer microchip design services; Design of computer microchips; Maintenance of computer programs; Design of computer programs; Programming of computer programs; Computer software development, computer programming and maintenance of computer software for cyber security and encryption; Rental of computers relating to computer security and prevention of computer risks; Technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; Computer technology consultancy in the field of cyber security and encryption; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer programming consultancy in the field of cyber security and encryption; Consulting services in the fields of selection, implementation and use of computer hardware and software systems for others; Technological research in the field of cybersecurity and encryption; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Design and development of computers and programs for computers; Testing of computing equipment; Technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; Application service provider, namely, hosting, managing, developing, and maintaining applications, software, and web sites, in the fields of personal productivity, wireless communication, mobile information access, and remote data management for wireless delivery of content to handheld computers, laptops and mobile electronic devices; Data encryption services; Message encryption services; Message encryption for others; Data encryption and decoding services; Encryption of messages for others; Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Technology consultation in the field of cybersecurity; Computer programming consultancy in the field of cybersecurity |