9
Authentication software; Software for use in trusted services and electronic identification, in particular relating to trusted electronic documents and time stamping; Data processing apparatus and computers for use in trusted services and electronic identification, in particular relating to trusted electronic documents, electronic signatures and time stamping; Software for operating authentication servers; Software for electronic signing and stamping of binary data of all kinds, including PDF documents, XML data; Software and applications for mobile devices; Hardware and software for a public key infrastructure (PKI), Namely smart cards, Secure signature creation units, security modules, Card reading equipment, Software for the aforesaid goods
38
Transmission of digital information; Telecommunication services, Especially Protected transmission and processing of data of trusted services; Transmission of test results established by testing any signed binary data, including the associated certificates, including proof of signed documents, to others
42
Authentication services; Providing computer programs and computer devices for data processing, Providing of computer programs and equipment for data processing for use in trusted services and electronic identification; Authentication services, namely Electronic signing and stamping of data transmitted via telecommunications; User authentication services using single sign-on technology for online software applications; Services of a company involved in electronic data and information processing and electronic media, namely creating and providing concepts and methods for cryptology and other basic technologies for ensuring security in information and communications technology; Registration of users for application of trusted services as an IT service; Digitalisation of signatures and stamps; Authentication services, for others, namely, Certification provider services, namely, Testing signed binary data of all kinds, including certificates relating thereto, including testing of signed documents; Infrastructure as a Service [IaaS]; Authentification services, namely, Providing of test results of signed binary data within the framework of an information and authentication service; Design and The installation, in relation to the following goods: Software for connecting systems of others, of all kinds, for use in trusted services; Installation, maintenance and repair of the following goods: Computer software for the operation of a public key infrastructure (PKI)