9 computer hardware, namely, cryptographic tokens and smart card readers; computer software for use in maintaining information security access control to computers, securing electronic communications, storing electronic signatures, and generating, distributing and recovering keys in network configuration