Cryptico A/S

 Cryptico A/S contact information is shown below
Owner:CRYPTICO A/S
Owner Address:Fruebjergvej 3 2100 Kobenhavn O Denmark
Owner Web Site
Owner Phone
Owner Toll Free
Owner Fax

 

Brands Owned byCryptico A/S

Brand:

CRYPTICORE

Description:

Computer security products for use in the field of data security, namely, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, namely, software development tools and products, namely, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, namely, for use in electronic transmission and authentication of information in the field of communications; computer firmware, namely, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, namely, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, namely, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, namely, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones; telecommunications equipment, namely, radio transmitters, telephone transmitters, satellite transmitters, receivers, namely, telephone, audio receivers, video receivers and data receivers, namely PCI cards, set top boxes and satellite receivers, PC cards, LAN cards, and WLAN cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, PC cards, set-up boxes and network interface cards; wireless communication processors, namely, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, namely smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, namely, network integrity; computer terminals for use with credit cards, debit cards and smart cards, namely, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, namely, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards;Printed matter in the form of pamphlets, brochures, newsletters, journals, magazines, printed computer software program guides all related to computers, computer hardware, computer control units, computer software and computer software algorithm specifications and computer software product specifications; manuals in the fields of encryption, decryption, software certification, computer use authorization, authentication, verification, data privacy, confidentiality and data integrity; printed matter, namely, newsletters, pamphlets, brochures, journals and magazines concerning education and training programs in the field of encryption, decryption, software certification, computer use authorization, authentication, verification, data privacy, confidentiality and data integrity; mounted and unmounted photographs; stationery; printed matter, information and publications in the form of brochures, books, handbooks, and magazines all in the field of encryption, decryption, software certification, computer use authorization, authentication, verification, data privacy, confidentiality and data integrity; debit cards without magnetic encoding; and printed instructional, educational and teaching materials for educational and training programs in the field of encryption, decryption, software certification, computer use authorization, verification, ensuring of data privacy, confidentiality and data integrity;CRYPT I CORE;Computer security analyses services; consultancy in connection with technological licensing of encryption methods, security computer hardware and security computer software; consultancy in connection with security in the field of technology information, namely encryption and security consultancy; consultancy concerning computer security questions;Computer programming for others and computer data programming for others; development of computer systems for others; design of computer systems for others; updating of computer software for others; research in and development of computer software for others; research in and development of computers and computer software for others; technical computer consultancy; rental of computers and computer software; design and updating of computer software and computer hardware for others; design of web sites and computer software for others;

Category: COMPUTER SECURITY PRODUCTS USE