09
Downloadable software for the unification, management,
optimization and integration of computer systems and
networks, enterprise software applications, users, and
Internet resources; downloadable software for computer
systems and network access control featuring digital
identity authentication, security management and security
application auditing; downloadable software for the
monitoring, analyzing, and reporting on the performance of
computer systems, networks, and enterprise software
applications; downloadable software for providing computer
security service to verify user or machine identities, user
or machine permissions, and for the management of user or
machine data; downloadable software for identity management
and identity security and for ensuring the security of
computer networks, databases, computer software, software
applications and software development tools; downloadable
software to manage network and database users, simplify user
authentication, and control access to computer software,
software applications and software development tools;
downloadable software for securing communications between
computers; downloadable software for providing user
authentication services in online communications,
transactions, and applications for network access control,
security management and security application auditing;
downloadable software for providing authentication of
personal identification information; downloadable software
for providing authentication for communications and
transactions via a global computer network; downloadable
software for identity verification and fraud detection and
prevention; recorded software for the unification,
management, optimization and integration of computer systems
and networks, enterprise software applications, users, and
Internet resources; recorded software for computer systems
and network access control featuring digital identity
authentication, security management and security application
auditing; recorded software for the monitoring, analyzing,
and reporting on the performance of computer systems,
networks, and enterprise software applications; recorded
software for providing computer security service to verify
user or machine identities, user or machine permissions, and
for the management of user or machine data; recorded
software for identity management and identity security and
for ensuring the security of computer networks, databases,
computer software, software applications and software
development tools; recorded software to manage network and
database users, simplify user authentication, and control
access to computer software, software applications and
software development tools; recorded software for securing
communications between computers; recorded software for
providing user authentication services in online
communications, transactions, and applications for network
access control, security management and security application
auditing; recorded software for providing authentication of
personal identification information; recorded software for
providing authentication for communications and transactions
via a global computer network; recorded software for
identity verification and fraud detection and prevention
42
Software as a service (SaaS) services featuring software
which provides unification, management, performance
optimization, integration, and access of computer systems
and networks, enterprise software applications, users, and
internet resources; software as a service (SaaS) services
featuring software featuring digital identity
authentication, security management and security application
auditing; computer services, namely, monitoring, analyzing,
and reporting on the performance of computer systems,
networks, and enterprise software applications; computer
security consultancy; computer security services, namely,
providing computer security service to verify user or
machine identities, user or machine permissions, and for the
management of user or machine data; providing temporary use
of online non-downloadable software, namely, identity
management and identity security software for use by others
for ensuring the security of computer networks, databases,
computer software, software applications and software
development tools; providing temporary use of online
non-downloadable software for use by others to manage
network and database users, simplify user authentication,
and control access to computer software, software
applications and software development tools; software as a
service (SaaS) services featuring software for securing
communications between computers; computer services, namely,
providing user authentication services using software
technology in online communications, transactions, and
applications for network access control, security management
and security application auditing; computerized
identification verification services, namely, providing
authentication of personal identification information using
software technology for communications and transactions via
a global computer network; computerized identification
verification services, namely, providing authentication
using software technology for communications and
transactions via a global computer network, namely,
validating personal identification information and user
credentials to secure access to online computer services and
software programs and products software as a service (SaaS)
services for identity verification and fraud detection and
prevention
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen