9
Computer software, hardware and peripheral equipment, including disks, servers, clients, secure personal handheld computers and other electronic apparatus and instruments, magnetic coded cards, smart cards, tokens, integrated circuits; software, firmware and hardware for information and data communication, information and data transactions, network, virtual private network, firewall, proxies, plug-ins, applets; computer security products, namely computer hardware, software and peripheral equipment for secure communication, secure storage, cryptography, security, digital signatures, encryption, key generation, authentication, identification, message authentification, privacy and anonymity, confidentiality, integrity, non-repudiation, access control, cryptographic standards, cryptographic algorithms, protocols, hash functions, cryptographic boxes; computer software, hardware and peripheral equipment for third party services, including certificates, attributes, certificates, instant certificates, qualified certificates, certification, authorization, certification authority, digital credentials, digital identities, digital privileges, local registration, time stamp, secure time stamp, notary services, directory, database; computer software, hardware and peripheral equipment for electronic money, electronic cheques, electronic purse, electronic payment, secure display, electronic voting, electronic negotiable documents, uniqueness of electronic documents, electronic commerce, initialisation centre for chip cards; computer software and hardware for telecommunications equipment, pagers, cellular phones, modems, ASN1 tools, audit log, independent verification, on-line help, steganography
41
Education and providing of training concerning information and data security, cryptography and cryptographic software, products and applications
42
Cryptographic and information security consulting, technology licensing; computer systems development and systems integration relating to information security, legal advice concerning digital signatures; legal advice concerning use of cryptography, evaluation of threats and weaknesses; formulation of security policies and interchange agreements; legal advice concerning electronic communication (national as well as international); evaluation and development of cryptographic algorithms and protocols; design and specification of system security architectures; security integration into applications, including EDI, X400 and X500, integration of chipcard solutions; integration of cryptographic algorithms, methods and hardware