Brands and Their Owners
Welcome to the Brand page for “D-TA”, which is offered here for Computer software for data security, encryption, secure backups and secure digital content distribution; integrated-circuit chips; magnetic encoders; magnetic encoded identification cards; encoded service cards, electronic and magnetic id cards for use in connection with encoding data; stored computer programs, in particular, cryptographic, encryption, decryption, certification and signature programs for encoding, decoding, encrypting and decrypting data and for certification of the accuracy of the data; downloadable computer programs, in particular, cryptographic, encryption, decryption, certification and signature programs for encoding, decoding, encrypting and decrypting data and for certification of the accuracy of the data; stored computer software, cryptographic, encryption, decryption, certification and signature programs for encoding, decoding, encrypting and decrypting data and for certification of the accuracy of the data; electric couplings; integrated circuit cards being smart cards, pre-encoded with encryption coding; magnetic identity cards; magnetic cards, magnetically encoded key cards; electrical and electronic apparatus and instruments for receiving, transmitting, processing, storing, protecting and authenticating data, pre-recorded flash drives featuring data encryption software; encoding and decoding apparatus; encryption and decryption apparatus, computer software for use in the encryption and decryption of digital files, audio, video, text, binary, still images, graphics and multimedia files; encryption apparatus, computer software for use in the encryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; data processing equipment, hardware components and data carriers of all kinds with programs installed, for the secure processing and transmission of highly sensitive data; computer hardware cryptography keys for data in computer networks, public key computer hardware cryptography keys for data in computer networks, computer hardware keys for computers; computer peripheral devices; parts, fittings, software and firmware in the nature of cryptography and encryption;telecommunication services, telecommunications gateway services, telecommunications by email, telecommunications consultation, transfer of data by telecommunications; electronic mail; wireless and mobile communications, mobile radio communication, mobile telephone communication, wireless communications services, transmission of graphics to mobile telephones; internet transmission of electronic, telephone, satellite, cable, internet services (telecommunications); internet transmission of communications with facilities for ensuring content transmission security, transmission of secure email via the internet; telecommunications services, transmission of data via secure electronic, telephone, satellite, cable, internet services communications; secure transmission of electronic and internet messages and electronic information; access and link to security communications systems, and the internet, telecommunications gateway services for the purpose of transmitting secure data; advisory, information and consultancy, all relating to communication security services being telecommunications; consulting services in the fields of telecommunications; provision of telecommunication access and links to databases; all the above mentioned services being intended for use in the field of authentication, data security, data encryption and cryptography in computer programs, applications, network services and hardware devices;data encryption services; cryptography of data in computer networks; public key cryptography of data in computer networks; data cryptography; scientific, technical and security research in the field of security technology; development of techniques, equipment and systems, new cryptographic codes in the fields of secure processing, routing, transmission and delivery of telecommunications; provision of services relating to secure processing of information, voice, data and images via electronic, telephone, satellite, cable, internet and computers, development of software for secure network operations; technical consultancy, information technology consultation; scientific research and professional consultancy relating to technology, computers, computer software, computer security and computer programming; consulting services in the fields of security, computer security and product design; design and maintenance of on-line computer databases, computer software and on-line databases featuring documentation for others; provision of technical information by telephone, all relating to the aforesaid services, technical support services, troubleshooting, troubleshooting in the nature of diagnosing computer hardware and software problems relating to the aforesaid services; creation and maintenance of web pages and web sites; scientific laboratory services; scientific, mathematical, technical and computer modelling services, providing computer simulation from computer programs for others; design of web pages; provision of secure computing services; scientific and technological services, research and design relating to computer software for data security, encryption, secure backups and secure digital content distribution, integrated-circuit chips, magnetic encoders, encoded identification cards, encoded service cards, computer programs stored or downloadable, cryptographic, encryption, decryption, certification and signature programs; scientific and technological services, research and design relating to electric couplings, integrated circuit cards as smart cards, magnetic identity cards, magnetic cards, mobile telephones; scientific and technological services, research and design relating to electrical and electronic apparatus and instruments for receiving, transmitting, processing, storing, protecting and authenticating data, coding and/or decoding apparatus, encryption and decryption apparatus, encryption apparatus, data processing equipment, hardware components and data carriers of all kinds with programs installed, for the secure processing and transmission of highly sensitive data; scientific and technological services, research and design relating to computer hardware cryptography keys for data in computer networks, public key computer hardware cryptography keys for data in computer networks, computer hardware keys for computers, computer peripheral devices; design and development of computer hardware and software; updating of computer software; updating of internet pages; providing temporary use of non-downloadable computer programs on data networks; consultancy in the field of computers; computer software consulting; data security services, design and development of electronic data security systems; data management on servers, computer services, remote and on-site management of communications servers of others; database construction, design and development of computer databases and encryption; computer programming; certification agency services being trust centers, issuing and management of digital codes and digital signatures in the nature of software for authenticating digital signatures; electronic data processing (edp) consultancy; research and development of encoding and cryptography products for others; computer programming, cryptographic, encryption, decryption, certification and signature programs; consultancy, consultancy in the design and development of computer hardware; implementation of computer programs on networks for others; installation of computer programs; configuring, design of computer networks by means of software; conversion of computer programs for data other than physical alteration; conversion of data, documents from physical to electronic media; copying of computer programs; computer software installation and maintenance; checking of digital signatures, electronic document and e-mail authentication services; computer security services for protection against illegal network access, restricting access to and by computer networks; technical computer project management in the field of electronic data processing; checking of digital signatures through software development; computer software rental; maintenance of computer software;.
Its status is currently believed to be active. Its class is unavailable. “D-TA” is believed to be currently owned by “OMLIS LIMITED”.
Owner: |
OMLIS LIMITED
Owner Details |
---|---|
Description: |
Computer software for data security, encryption, secure backups and secure digital content distribution; integrated-circuit chips; magnetic encoders; magnetic encoded identification cards; encoded service cards, electronic and magnetic ID cards for use in connection with encoding data; stored computer programs, in particular, cryptographic, encryption, decryption, certification and signature programs for encoding, decoding, encrypting and decrypting data and for certification of the accuracy of the data; downloadable computer programs, in particular, cryptographic, encryption, decryption, certification and signature programs for encoding, decoding, encrypting and decrypting data and for certification of the accuracy of the data; stored computer software, cryptographic, encryption, decryption, certification and signature programs for encoding, decoding, encrypting and decrypting data and for certification of the accuracy of the data; electric couplings; integrated circuit cards being smart cards, pre-encoded with encryption coding; magnetic identity cards; magnetic cards, magnetically encoded key cards; electrical and electronic apparatus and instruments for receiving, transmitting, processing, storing, protecting and authenticating data, pre-recorded flash drives featuring data encryption software; encoding and decoding apparatus; encryption and decryption apparatus, computer software for use in the encryption and decryption of digital files, audio, video, text, binary, still images, graphics and multimedia files; encryption apparatus, computer software for use in the encryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; data processing equipment, hardware components and data carriers of all kinds with programs installed, for the secure processing and transmission of highly sensitive data; computer hardware cryptography keys for data in computer networks, public key computer hardware cryptography keys for data in computer networks, computer hardware keys for computers; computer peripheral devices; parts, fittings, software and firmware in the nature of cryptography and encryption;Telecommunication services, telecommunications gateway services, telecommunications by email, telecommunications consultation, transfer of data by telecommunications; electronic mail; wireless and mobile communications, mobile radio communication, mobile telephone communication, wireless communications services, transmission of graphics to mobile telephones; internet transmission of electronic, telephone, satellite, cable, internet services (telecommunications); internet transmission of communications with facilities for ensuring content transmission security, transmission of secure email via the internet; telecommunications services, transmission of data via secure electronic, telephone, satellite, cable, internet services communications; secure transmission of electronic and internet messages and electronic information; access and link to security communications systems, and the Internet, telecommunications gateway services for the purpose of transmitting secure data; advisory, information and consultancy, all relating to communication security services being telecommunications; consulting services in the fields of telecommunications; provision of telecommunication access and links to databases; all the above mentioned services being intended for use in the field of authentication, data security, data encryption and cryptography in computer programs, applications, network services and hardware devices;Data encryption services; cryptography of data in computer networks; public key cryptography of data in computer networks; data cryptography; scientific, technical and security research in the field of security technology; development of techniques, equipment and systems, new cryptographic codes in the fields of secure processing, routing, transmission and delivery of telecommunications; provision of services relating to secure processing of information, voice, data and images via electronic, telephone, satellite, cable, internet and computers, development of software for secure network operations; technical consultancy, information technology consultation; scientific research and professional consultancy relating to technology, computers, computer software, computer security and computer programming; consulting services in the fields of security, computer security and product design; design and maintenance of on-line computer databases, computer software and on-line databases featuring documentation for others; provision of technical information by telephone, all relating to the aforesaid services, technical support services, troubleshooting, troubleshooting in the nature of diagnosing computer hardware and software problems relating to the aforesaid services; creation and maintenance of web pages and web sites; scientific laboratory services; scientific, mathematical, technical and computer modelling services, providing computer simulation from computer programs for others; design of web pages; provision of secure computing services; scientific and technological services, research and design relating to computer software for data security, encryption, secure backups and secure digital content distribution, integrated-circuit chips, magnetic encoders, encoded identification cards, encoded service cards, computer programs stored or downloadable, cryptographic, encryption, decryption, certification and signature programs; scientific and technological services, research and design relating to electric couplings, integrated circuit cards as smart cards, magnetic identity cards, magnetic cards, mobile telephones; scientific and technological services, research and design relating to electrical and electronic apparatus and instruments for receiving, transmitting, processing, storing, protecting and authenticating data, coding and/or decoding apparatus, encryption and decryption apparatus, encryption apparatus, data processing equipment, hardware components and data carriers of all kinds with programs installed, for the secure processing and transmission of highly sensitive data; scientific and technological services, research and design relating to computer hardware cryptography keys for data in computer networks, public key computer hardware cryptography keys for data in computer networks, computer hardware keys for computers, computer peripheral devices; design and development of computer hardware and software; updating of computer software; updating of Internet pages; providing temporary use of non-downloadable computer programs on data networks; consultancy in the field of computers; computer software consulting; data security services, design and development of electronic data security systems; data management on servers, computer services, remote and on-site management of communications servers of others; database construction, design and development of computer databases and encryption; computer programming; certification agency services being trust centers, issuing and management of digital codes and digital signatures in the nature of software for authenticating digital signatures; electronic data processing (EDP) consultancy; research and development of encoding and cryptography products for others; computer programming, cryptographic, encryption, decryption, certification and signature programs; consultancy, consultancy in the design and development of computer hardware; implementation of computer programs on networks for others; installation of computer programs; configuring, design of computer networks by means of software; conversion of computer programs for data other than physical alteration; conversion of data, documents from physical to electronic media; copying of computer programs; computer software installation and maintenance; checking of digital signatures, electronic document and e-mail authentication services; computer security services for protection against illegal network access, restricting access to and by computer networks; technical computer project management in the field of electronic data processing; checking of digital signatures through software development; computer software rental; maintenance of computer software;
|
Categories: | COMPUTER SOFTWARE DATA SECURITY |