09
Computer software (recorded or downloadable), hardware and
peripheral equipment, including disks, servers, integrated
circuits and printers and their parts and fittings; software
(recorded or downloadable), firmware and hardware for
information and data communication, monitoring and logging
of data, information and data transactions, network, virtual
private network, firewall and proxies; VPN (virtual private
network) operating software, including to enable secure
remote programming and remote control of industrial
equipment; VPN (virtual private network) hardware, including
to enable secure remote programming and remote control of
industrial equipment and monitoring and logging of data;
computer security products, namely computer hardware,
software (recorded or downloadable) and peripheral equipment
for secure communication, secure storage, cryptography,
security, digital signatures, encryption, key generation,
authentification, identification, message authentification,
privacy and anonymity, confidentiality, integrity,
non-repudiation, access control, cryptographic standards,
cryptographic algorithms, protocols, hash functions and
cryptographic boxes; computer software, hardware and
peripheral equipment for trusted third party services,
including certificates, attributes, instant certificates
(ongoing certification), qualified certificates,
certification, digital credentials, digital identities,
digital privileges
38
Providing virtual private network (VPN) services;
communication via virtual private networks (VPN), including
to enable secure remote programming and remote control of
industrial equipment and monitoring and logging of data
42
Design and development of computer hardware, software and
systems; hosting and back-up of webpages for others;
computer programming; installation and maintenance of
computer software and computer programs; rental of computer
hardware and software; consultancy, advice and information
relating to computer software and hardware; provision of
security services for computer networks, computer access and
computerised transactions; encryption, decryption and
authentication of information, messages and data;
technological consulting in relation to cryptography and
information security; computer systems development and
integration in relation to information security;
technological evaluation and development of cryptographic
algorithms and protocols; software development, namely
design and specification of system security architectures,
including security integration into applications, including
X.509, and integration of cryptographic algorithms, methods
and hardware
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen