9
Computer software (recorded or downloadable), hardware and peripheral equipment, including disks, servers, integrated circuits and printers and their accessories; software (recorded or downloadable), firmware and hardware for information and data communication, monitoring and logging of data, information and data transactions, network, virtual private network, firewall and proxies; VPN (virtual private network) operating software, including to enable secure remote programming and remote control of industrial equipment; VPN (virtual private network) hardware, including to enable secure remote programming and remote control of industrial equipment and monitoring and logging of data; computer security products, namely computer hardware, software (recorded or downloadable) and peripheral equipment for secure communication, secure storage, cryptography, security, digital signatures, encryption, key generation, authentification, identification, message authentification, privacy and anonymity, confidentiality, integrity, non-repudiation, access control, cryptographic standards, cryptographic algorithms, protocols, hash functions and cryptographic boxes; computer software, hardware and peripheral equipment for trusted third party services, including certificates, attributes, instant certificates, qualified certificates, certification, digital credentials, digital identities, digital privileges
38
Telecommunications; providing virtual private network (VPN) services; communication via virtual private networks (VPN), including to enable secure remote programming and remote control of industrial equipment and monitoring and logging of data
42
Design and development of computer hardware, software and systems; hosting and back-up of webpages for others; computer programming; installation and maintenance of computer software and computer programs; rental of computer hardware and software; consultancy, advice and information relating to computer software and hardware; provision of security services for computer networks, computer access and computerised transactions; encryption, decryption and authentication of information, messages and data; technological consulting in relation to cryptography and information security; computer systems development and integration in relation to information security; technological evaluation and development of cryptographic algorithms and protocols; software development, namely design and specification of system security architectures, including security integration into applications, including X509, and integration of cryptographic algorithms, methods and hardware