9
Computer software (recorded or downloadable), hardware and peripheral equipment, including disks, servers, integrated circuits and printers and their accessories; software (recorded or downloadable), firmware and hardware for information and data communication, information and data transactions, network, virtual private network, firewall and proxies; computer security products, namely computer hardware, software (recorded or downloadable) and peripheral equipment for secure communication, secure storage, cryptography, security, digital signatures, encryption, key generation, authentification, identification, message authentification, privacy and anonymity, confidentiality, integrity, non-repudiation, access control, cryptographic standards, cryptographic algorithms, protocols, hash functions and cryptographic boxes; computer software, hardware and peripheral equipment for trusted third party services, including certificates, attributes, instant certificates, qualified certificates, certification, digital credentials, digital identities, digital privileges
38
Telecommunications
42
Technological consulting relating to cryptography and information security; computer systems development and integration relating to information security; technological evaluation and development of cryptographic algorithms and protocols; software development, namely design and specification of system security architectures, including security integration into applications, including X.509, and integration of cryptographic algorithms, methods and hardware