09
Hardware and software, especially in the area of IT security
and IT security technology; hardware and software for
ensuring the authenticity, integrity and confidentiality of
data in single-user and multi-user environments, and for the
secure generation, storage and management of cryptographic
keys; software for the encryption of memory media and
devices, especially at sector level, for access protection
and protection before and during booting, for the encryption
of files and directories on virtual disk drives and for
group-oriented and transparent encryption systems,
especially those based on certificates; software for
automatic password management and user authentication and
for identity and rights management; IP filters (Personal
Firewall) to protect against internal and external
intervention via TCP/IP, NetBIOS and UDP; biometrics
hardware and reading devices, especially fingerprint readers
and biometric chip cards; hardware and software for creating
time stamps; software for managing and creating inventories
of applications and hardware systems; hardware security
modules used for the secure storage and use of cryptographic
keys and certificates; public key infrastructure software
for issuing and administering digital identities
41
Planing, organization and provision of training courses and
seminars, especially in the area of IT security and IT
security technology
42
Services involving IT security and IT security technology,
in particular security consultation for and about hardware
and software; securing databases; implementation of security
systems in existing computers and computer networks; hosting
of security programs on database and application servers;
centralized and decentralized e-mail security services with
encryption and electronic signature, centralized and
decentralized authentication and signature services; IT and
security technology consultation and the planning,
development and commercial creation of data processing
programs (security software) involving network-based
security software systems, especially Internet, intranet and
extranet solutions, of multimedia applications, of
interactive multi-media systems, of multi-media contents
(content creation), of Internet websites (netdesign), of
Internet domains for third parties and of Internet portals;
creation of technical certificates in the area of IT
security and IT security technology; provision of services
in the area of data processing, namely tailoring, updating,
implementing and maintaining security software