KINIBI

Welcome to the Brand page for “KINIBI”, which is offered here for Computer software for ensuring the security of transactions on electronic devices; computer hardware; computer software and computer hardware used for creating secure operating environments in mobile devices and computers; microprocessors; microprocessor cores; macro cells, cells in mobile phone networks that provide radio signal coverage; microcontrollers; system-on chips, integrated circuit modules; printed circuit boards; secure microprocessor cores; hardware-assisted computer security products, integrated computer chips for creating secure operating environments in electronic devices and computers; computer hardware for digital security; computer software for digital security, for authenticating digital assets; computer software for protecting and securing computer applications; computer hardware for encrypting and authenticating data; computer software for encrypting and authenticating data; computer application software for mobile phones, handheld computers, portable media players and electronic devices, software for ensuring the security of electronic transactions; operating system software; software development tools; application programming interface (api) software for integrating security tools into electronic devices; computer software for the design, development, modelling, simulation, compiling, de-bugging, verification, construction, interconnecting and interfacing of computer hardware and software;design and development of computer hardware and computer software; design and development of computer hardware and computer software for use in connection with digital security, encryption and authentication of data and creating secure operating environments in mobile devices and computers; design and development of software development tools; technical consultancy services in relation to computer hardware, computer software, software development tools, microprocessors, microprocessor cores, macro cells, cells in mobile phone networks that provide radio signal coverage, microcontrollers, system-on chips, integrated circuit modules, and printed circuit boards; updating and maintenance of computer software and software development tools; application service provider featuring application programming interface (api) services for integration of security protocols in electronic devices; software-as-a-service (saas) services featuring software for computer and electronic device security and integration of security protocols in electronic devices; software-as-a-service (saas) services featuring software for computer security, data encryption and authentication; providing temporary use of non-downloadable computer software for computer and electronic device security and integration of security protocols in electronic devices; providing temporary use of non-downloadable computer software for use in creating secure operating environments in mobile electronic devices and computers; data encryption services; and authentication services for electronic assets and transactions;.

Its status is currently believed to be active. Its class is unavailable. “KINIBI” is believed to be currently owned by “Trustonic Limited”.

Owner:
TRUSTONIC LIMITED
Owner Details
Description:
Computer software for ensuring the security of transactions on electronic devices; computer hardware; computer software and computer hardware used for creating secure operating environments in mobile devices and computers; microprocessors; microprocessor cores; macro cells, cells in mobile phone networks that provide radio signal coverage; microcontrollers; system-on chips, integrated circuit modules; printed circuit boards; secure microprocessor cores; hardware-assisted computer security products, integrated computer chips for creating secure operating environments in electronic devices and computers; computer hardware for digital security; computer software for digital security, for authenticating digital assets; computer software for protecting and securing computer applications; computer hardware for encrypting and authenticating data; computer software for encrypting and authenticating data; computer application software for mobile phones, handheld computers, portable media players and electronic devices, software for ensuring the security of electronic transactions; operating system software; software development tools; application programming interface (API) software for integrating security tools into electronic devices; computer software for the design, development, modelling, simulation, compiling, de-bugging, verification, construction, interconnecting and interfacing of computer hardware and software;Design and development of computer hardware and computer software; design and development of computer hardware and computer software for use in connection with digital security, encryption and authentication of data and creating secure operating environments in mobile devices and computers; design and development of software development tools; technical consultancy services in relation to computer hardware, computer software, software development tools, microprocessors, microprocessor cores, macro cells, cells in mobile phone networks that provide radio signal coverage, microcontrollers, system-on chips, integrated circuit modules, and printed circuit boards; updating and maintenance of computer software and software development tools; application service provider featuring application programming interface (API) services for integration of security protocols in electronic devices; software-as-a-service (SAAS) services featuring software for computer and electronic device security and integration of security protocols in electronic devices; software-as-a-service (SAAS) services featuring software for computer security, data encryption and authentication; providing temporary use of non-downloadable computer software for computer and electronic device security and integration of security protocols in electronic devices; providing temporary use of non-downloadable computer software for use in creating secure operating environments in mobile electronic devices and computers; data encryption services; and authentication services for electronic assets and transactions;
Categories: COMPUTER SOFTWARE ENSURING