MUGI

Welcome to the Brand page for “MUGI”, which is offered here for Computer security products for use in the field of data security, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, software development tools and products, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, for use in electronic transmission and authentication of information in the field of communications; computer firmware, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, pre-recorded cd-roms and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones telecommunications equipment, radio transmitters, telephone transmitters, satellite transmitters, receivers, telephone, audio receivers, video receivers and data receivers, pci cards, set top boxes and satellite receivers, pc cards, lan cards, and wlan cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, pc cards, set-up boxes and network interface cards; wireless communication processors, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, network integrity; computer terminals for use with credit cards, debit cards and smart cards, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards;.

Its status is currently believed to be active. Its class is unavailable. “MUGI” is believed to be currently owned by “KABUSHIKI KAISHA HITACHI SEISAKUSHO”.

Owner:
KABUSHIKI KAISHA HITACHI SEISAKUSHO
Owner Details
Description:
Computer security products for use in the field of data security, computer hardware and computer software that encrypts data; computer hardware and computer software that decrypts data; computer hardware and computer software that permit access to data by generating access codes and by verifying access codes, computer hardware and computer software that authenticate users, computer hardware and computer software that issue and manage digital user identities and access privileges for electronic commerce and security, and computer hardware and computer software that integrate cryptographic security features into other software applications; computer software and electronic documentation, software development tools and products, algorithms used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer software, for use in electronic transmission and authentication of information in the field of communications; computer firmware, for use in encryption, decryption, authentication and transmission of information; computer hardware for use in encryption, decryption, authentication and transmission of information and data communication, information and data transactions, networking, cryptography, digital signatures and public and private key generation, security functions, encryption, decryption, certification, authorization, authentication, verification, ensuring of data privacy, confidentiality and data integrity; integrated circuits; computer software storage media, pre-recorded CD-ROMS and computer diskettes featuring computer software and documentation for providing encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity; computer networking software for cryptography, digital signatures and private and public key generation, and security functions, encryption, decryption, certification, authentication, verification, ensuring data privacy confidentiality and data integrity; radio pagers; modems; cellular telephones telecommunications equipment, radio transmitters, telephone transmitters, satellite transmitters, receivers, telephone, audio receivers, video receivers and data receivers, PCI cards, set top boxes and satellite receivers, PC cards, LAN cards, and WLAN cards; electric switches; computer networks, local area networks, wide area networks, virtual private networks, and wireless computer networks used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity all comprised of telephones, laptop computers, personal computers, servers, modems, PC cards, set-up boxes and network interface cards; wireless communication processors, satellite processors, cellular telephony base stations, signal processors, two-way radio pagers, radio and satellite telephones, wireless handheld computers, magnetic coded cards and plastic cards with embedded integrated circuits and stored information and data, smart cards used in encryption, decryption, certification, authorization, authentication, verification, data privacy, confidentiality and data integrity, network integrity; computer terminals for use with credit cards, debit cards and smart cards, magnetic coded card readers and smart cards readers; watermarking computer software algorithms for computer software verification, steganography computer software algorithms for computer software verification; stored value smart cards, encoded integrated circuit cards containing programming used for encryption, decryption, certification of user, authorization of user, authentication of user, verification of user; magnetically encoded credit cards;
Categories: COMPUTER SECURITY PRODUCTS USE