09
Computer software for monitoring and improving the security
of, and detecting and protecting against cyber-attacks and
threats directed at, computers, computer systems, networks,
hardware, software applications, digital devices, digital
data, and mobile devices; data processing equipment,
computers and computer software used for the verification
and authentication of personal data; computer software for
digital signatures in virtual data lockers for the purpose
of cryptographic network security and data security
functions on the Internet; computer software; computer
software for network security, system security, file
security, data security, and personal identification
security; computer software for automating processes for
authentication of identity using existing databases or
partners in connection with the issuance and management of
digital certificates used for authentication or encryption
of digital communications, or authentication and
verification of digital signatures in electronic
transactions or communications, over the Internet and other
computer networks
42
Managing and administering a decentralized computer system
for issuing identity credentials and documentation,
verifying identity credentials and documentation, storing
identity credentials and documentation, encrypting identity
credentials and documentation, transmitting identity
credentials and documentation, and tracking and monitoring
transmission of identity credentials and documentation;
platform as a service (PAAS) for enabling and managing
identity credentials, identity information, identity
documentation and verification of same and transmission of
identity information and sensitive and/or confidential
information; providing non-downloadable computer software;
providing non-downloadable computer software for network
security, system security, file security, data security, and
personal identification security; providing software that
gives users the ability to have an authenticated identity
and identity credentials and documentation, for use in their
access to and transmission of sensitive and/or confidential
information; Software as Service (SAAS) services featuring
software for network security, system security, file
security, and data security; Software as Service (SAAS)
services featuring software for management and monitoring of
computer networks, systems, network connected devices,
files, and data; Software as Service (SAAS) services
featuring software for detection, analysis, reporting, and
restoration of changes to computer networks, systems,
network connected devices, applications, files, and data;
Software as Service (SAAS) services featuring software for
managing analyzing, and optimizing hardware and software in
an information technology environment; providing online,
non-downloadable software for assessing network information
security vulnerability and risk; providing online,
non-downloadable software for scanning and penetration
testing of computers and networks to assess the risk of
information security vulnerabilities, and to manage and
resolve information security vulnerabilities