Identification, financial and transaction card printers; computer software including software to operate identification, financial and transaction card printers, to issue identification, financial and transaction cards, to efficiently manage data in the card issuance process, to verify the accuracy of information on cards, and to secure data against unauthorised access; computer hardware; peripheral apparatus for use in connection with such identification, financial and transaction card printers, including, personal computers, keyboards, and servers; replacement parts for identification, financial and transaction card printers, including, print devices to transfer ink to the card, devices to clean components of the printers, and devices to apply laminates to cards; apparatus for encoding, indent printing, printing on and embossing plastic cards; peripheral apparatus in this class for encoding, indent printing, printing on and embossing plastic cards, including microprocessor controllers, electronic controllers for multi-function embossing, encoding and printing systems, pre-recorded application computer programmes, key boards for electronic data input, CRT display screens; parts in this class for such apparatus including rollers, platens and plates point of sale transactions; printing equipment for use with electronic data processing devices, including computer printers, roll printers, slip printers, continuous feed printers and thermal printers and parts in this class therefor including thermal transfer ribbons; electric imprinters for imprinting embossed cards on documents and parts in this class for electric imprinters
Identification apparatus and instruments for use in taxis and other ground transportation vehicles; teaching apparatus and instruments; magnetic data carriers, recording discs; data processing equipment and computers; magnetic encoded cards; bank, credit, debit and charge cards; computer hardware, software and peripherals; apparatus and instruments for data acquisition, data communication and voice communication, including radio apparatus; accounting and calculating apparatus and instruments, including taximeters; money and currency dispensing and depositing apparatus and instruments; video transmission line apparatus and television receivers; security systems, video surveillance equipment, intercom systems; data processing apparatus; smart cards; apparatus for games adapted for use with television receivers; identity cards, integrated circuit cards; intercommunication apparatus, including vehicle dispatch apparatus; interfaces for computers; laptop computers; modems, monitoring apparatus, including monitoring apparatus for vehicle navigation; notebook computers; palmtop computers; data processing equipment and readers; receivers (audio and video); receivers (telephone); satellites for scientific purposes; video alarms; video telephones; computer programs for connecting to remote computers and computer networks; computer programs for searching the contents of remote computers and computer networks; computer programs for transmitting and receiving data and files to and from remote computers and computer networks; computer programs for assisting users in navigating through local and global computer networks; computer software used in security and financial applications in the field of computer operating systems and computer networks; all the foregoing being for an identification system for use in taxis and other ground transportation vehicles
Identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; Software for automating authentication and governance of identity over the internet and other computer networks; Software for risk analytics in connection with management of user identity authentication and access privileges of users to data, software applications and cloud, mobile and network resources; Software for management of user identity authentication and access privileges to aid in compliance with regulatory and industry data protection requirements, user provisioning, role management, policy automation, access certification short message service (SMS), and voice one time password (OTP), biometric software and hardware for providing computer and mobile device user identity authentication; electronic security apparatus including electronic security token tokens in the nature of a fob-like device used by an authorized user of a computer system to authenticate user identity; Computer and network security software for identifying, managing and resolving cyber security incidents, data breaches and malware; Software for monitoring and improving the security of, and detecting, reporting, analyzing and protecting against cyber-attacks and threats directed at computers, computer systems, networks, computer and network hardware, software applications, digital devices, digital data, and mobile devices; Software for providing operational intelligence, business analytics, security information, troubleshooting, and monitoring of network security; Software for producing reports, dashboards, metrics and alerts related to computer, network and data security incidents; Integrated risk management software for risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for producing reports, dashboards, metrics and alerts related to risk, quality and compliance management, enterprise and operational risk management, internal audit management, automating business continuity, crisis management and disaster recovery planning and execution, managing technology and security related risks, cataloging third parties, contracts, engagements and related risks, and managing regulatory, governmental and corporate compliance; Software for electronic fraud and identity theft detection and prevention; Software for detecting, monitoring, managing and preventing fraud, financial crime, cybercrime, cyber threats, cyber-attacks, security attacks and intrusions; software for real-time internet, mobile and ecommerce fraud detection, protection, management, analytics and reporting; Software for managing user identity authentication and access privileges to aid in compliance with regulatory requirements; non-predictable code calculators, namely, computer hardware and computer software including non-predictable code calculators that generate security access codes for accessing host data bank computers; and computer software programs that issue and manage digital user identities and access privileges for electronic commerce and security