9
Identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; software for automating authentication and governance of identity over the internet and other computer networks; software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (sms), and voice one time password (otp), biometric software and hardware for providing computer and mobile device user identity authentication; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; non-predictable code calculator for accessing computer networks and computer resources; data processing equipment, computers; computer software
42
Software as a service (saas) services and cloud computing featuring identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; software as a service (saas) services and cloud computing featuring software for automating authentication and governance of identity over the internet and other computer networks; software as a service (saas) services and cloud computing featuring software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications, saas and cloud, mobile and network resources; software as a service (saas) services and cloud computing featuring software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification; software as a service (saas) services and cloud computing featuring software for authentication using short message service (sms), and voice one time password (otp), biometric software and hardware for providing computer and mobile device user identity authentication, fast identity online (fido) u2f (universal two factor) authenticators, hardware and software tokens, and otp via mobile device application; design and development of computer hardware and software