Description:
|
(1) - Computers and computer software for storing, maintaining and retrieving information through local and wide area computer networks and via global computer networks.
(2) - Computers and computer software for enrolling biometric details on persons.
(3) - Machine-assisted biometric identity confirmation systems comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(4) - Machine-assisted service delivery systems, protection and security systems, and access control systems, all comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons, and where required, to confirm a match with the human characteristics and/or behavioral traits recorded on an identification card or document or in a database to determine the rightful holder of an identification card or document.
(5) - Computers and computer software for clearing passengers crossing international borders.
(6) - Communication software for use in electronic communication, namely electronic communication of information, data, audio and images via a global communication network, via an intranet or local area network, via a wide area network, via wireless electronic communication, via telephone, via radio, via microwave transmission, and via satellite transmission.
(7) - Computers and computer software for identity verification, namely confirming a person's identity by comparison of the person's biometric data to biometric data stored on an identification card or document or in a database.
(8) - Consultation services, research and development services, design services, manufacturing services, supply services, hardware and software integration services, installation services, training and support services, advertising and promoting the goods and services of others, and sales of wares for others, all in association with machine-assisted biometric identification systems, namely service delivery systems, security and protection systems, access control systems, surveillance systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems all using automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(9) - Computers and computer software for watch-list identity detection, namely comparing a person's biometric data to biometric data of individuals stored in a watch-list database and identifying potential matches.
(10) - Automated camera systems for use in machine-assisted biometric identification systems, service delivery systems, security and protection systems, access control systems, surveillance systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems, all comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(11) - Computers and computer software for identity fraud detection, namely comparing a person's biometric data to biometric data stored in a database to determine if the biometric data matches more than one person.
(12) - Machine-assisted service delivery systems, protection and security systems, and access control systems, all comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons, and where required, to confirm a match with the human characteristics and/or behavioral traits recorded on an identification card or document or in a database to determine the rightful holder of an identification card or document.
(13) - Machine-assisted biometric identity confirmation systems comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(14) - Consultation services, research and development services, design services, manufacturing services, supply services, hardware and software integration services, installation services, training and support services, advertising and promoting the goods and services of others, and sales of wares for others, all in association with machine-assisted biometric identification systems, namely service delivery systems, security and protection systems, access control systems, surveillance systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems all using automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(15) - Computers and computer software for watch-list identity detection, namely comparing a person's biometric data to biometric data of individuals stored in a watch-list database and identifying potential matches.
(16) - Computers and computer software for storing, maintaining and retrieving information through local and wide area computer networks and via global computer networks.
(17) - Computers and computer software for identity verification, namely confirming a person's identity by comparison of the person's biometric data to biometric data stored on an identification card or document or in a database.
(18) - Computers and computer software for identity fraud detection, namely comparing a person's biometric data to biometric data stored in a database to determine if the biometric data matches more than one person.
(19) - Computers and computer software for enrolling biometric details on persons.
(20) - Computers and computer software for clearing passengers crossing international borders.
(21) - Communication software for use in electronic communication, namely electronic communication of information, data, audio and images via a global communication network, via an intranet or local area network, via a wide area network, via wireless electronic communication, via telephone, via radio, via microwave transmission, and via satellite transmission.
(22) - Automated camera systems for use in machine-assisted biometric identification systems, service delivery systems, security and protection systems, access control systems, surveillance systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems, all comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(23) - Machine-assisted biometric identity confirmation systems comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(24) - Consultation services, research and development services, design services, manufacturing services, supply services, hardware and software integration services, installation services, training and support services, advertising and promoting the goods and services of others, and sales of wares for others, all in association with machine-assisted biometric identification systems, namely service delivery systems, security and protection systems, access control systems, surveillance systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems all using automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(25) - Machine-assisted service delivery systems, protection and security systems, and access control systems, all comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons, and where required, to confirm a match with the human characteristics and/or behavioral traits recorded on an identification card or document or in a database to determine the rightful holder of an identification card or document.
(26) - Automated camera systems for use in machine-assisted biometric identification systems, service delivery systems, security and protection systems, access control systems, surveillance systems, identification card and document personalization systems, identification card and document inspection and authentication systems, and personal identification systems, all comprised of cameras and lighting devices for taking pictures, and/or image scanners, and/or fingerprint scanners, and/or iris scanners, and/or range finders, and/or presence detection sensors, and computer hardware and computer software for the automated capture and recognition of human characteristics and/or behavioral traits to establish or confirm the identity of persons and/or to determine the rightful holder of an identification card or document.
(27) - Computers and computer software for clearing passengers crossing international borders.
(28) - Computers and computer software for enrolling biometric details on persons.
(29) - Computers and computer software for identity verification, namely confirming a person's identity by comparison of the person's biometric data to biometric data stored on an identification card or document or in a database.
(30) - Computers and computer software for identity fraud detection, namely comparing a person's biometric data to biometric data stored in a database to determine if the biometric data matches more than one person.
(31) - Computers and computer software for watch-list identity detection, namely comparing a person's biometric data to biometric data of individuals stored in a watch-list database and identifying potential matches.
(32) - Communication software for use in electronic communication, namely electronic communication of information, data, audio and images via a global communication network, via an intranet or local area network, via a wide area network, via wireless electronic communication, via telephone, via radio, via microwave transmission, and via satellite transmission.
(33) - Computers and computer software for storing, maintaining and retrieving information through local and wide area computer networks and via global computer networks.
|