9
Programs for computers and microprocessors, Software, Security software, Computer data encryption and decryption software, Security tokens [encryption devices], software for protecting and securing connected objects; circuits for encrypting and decrypting computer data, Electronic devices for linking a computer and a communications network; Electronic components; Electronic chips; Integrated circuits; Micro-circuits; Printed circuits; Semi-conductors; Processors; Microprocessors; Microcontrollers; Smart cards; Memory cards; Secure electronic chips featuring encryption circuits; Secure integrated circuits featuring encryption circuits; Secure microcircuits featuring encryption circuits; Secure processors featuring encryption circuits; Secure microprocessors, The aforesaid products featuring encryption circuits; Secure microcontrollers, The aforesaid products featuring encryption circuits; Secure electronic chips with post-quantum cryptography; Secure integrated circuits with post-quantum cryptography; Secure microcircuits with post-quantum cryptography; Secure processors with post-quantum cryptography; Secure microprocessors with post-quantum cryptography; Secure microcontrollers with post-quantum cryptography; Data processing equipment and computers; data processing apparatus for protecting and securing connected objects; Digital and/or electronic certificates; Public keys, namely public key infrastructures relating to the field of computer security; Private keys, namely private key infrastructures relating to the field of computer security
42
Engineering services; Computer software design, Design of programs for computers and microprocessors; Design of the following goods: Computer data encryption and decryption software; Technical studies, design and development for computer systems; Design of electronic security modules, Design of electronic security modules; Technical studies, design and development for data exchange systems; Design of the following goods: Secure integrated circuits featuring encryption circuits; Design of the following goods: Secure integrated circuits with post-quantum cryptography; Studies and customised programming of chip cards and electronic cards; Consulting, in relation to the following fields: Data security services; Certification services of data transmitted via telecommunications; Computer security services in the nature of administering digital certificates; Computer consulting services in the field of security integration, network security, internet security, computer security, network architecture, encryption technology, computer security, and security certificates; Consultancy services, in relation to the following fields: Post-quantum computer security