9
Computer programs and computer software (recorded or downloadable); cloud computing software; computer software platforms; application software; downloadable cloud computing software for deploying virtual machines to a cloud computing platform and managing virtual machines on a cloud computing platform; computer software for encryption, decryption, authentication and verification of data, information and messages; biometric identification systems; computer software used for identifying persons in a biometric verification, identification and security system; software for use with electronic finger print readers and fingerprint imagers; software for document authentication and identity verification; software and firmware for authenticating user identification using one or more identity characteristics including biometrics, authentication of documents, and verification of data, to establish and verify identity; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication
16
Brochures, manuals, periodicals, magazines; printed matter, printed columns and articles; advertisement and publicity literature (printed); catalogues; flyers, pamphlets, booklets, reports, hoardings; advertisement boards of paper and cardboard; cards; letter heads, calendars and diaries; paper and paper articles
35
Computerized data processing; computerized database management; business consultation services; online media monitoring services using computer software to automatically monitor internet websites and online publications for customer-specified topics and to capture relevant content on those topics, and providing documentation and analysis of that online content to others for business purposes; providing business information directory services, via a global computer network; collection and systematisation of information into computer databases; providing business information, namely, commercial corporate and statistical information provided on-line from a computer database or the internet
42
Computer programming and computer software design; development of computer platforms; software as a service (SAAS) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; software as a service (SAAS) services, namely, hosting software for use by others to securely enrol, verify, issue, authenticate and manage personal and digital identities; design, development, installation, repair, and maintenance of computer software used for identifying and authenticating data, documents, and personal identity; verification of personal identification [computer security]