9 Computer-adapted accessory devices being computer peripherals; computer operating software adapted to computer operation; wireless communication devices for data transmission; electronic publications stored on computer media in the nature of magazines, books and periodicals in the field of authentication, IT security, mobile security, financial transaction security, access control and identity verification; instruction manuals for computers and computer software stored in electronic form on computer media; recorded data, namely, downloadable electronic data files featuring cryptographic keys, transaction numbers and personal identification numbers; computer software, downloadable from the Internet for authentication, IT security, mobile security, financial transaction security, access control and identity verification; downloadable education instructions in electronic form, namely, instruction manuals for computer software and hardware in the field of authentication, IT security, mobile security, financial transaction security, access control and identity verification; recorded compact discs featuring computer software, data files and instructions manuals in the field of authentication, IT security, mobile security, financial transaction security, access control and identity verification; operating system software for computers; devices for image capture and image development, namely, cameras and scanners; blank compact discs; encoded electronic chip cards for identifying particular users of computers and mobile telephones, authentication of financial transactions, access control and identity verification; chip card readers; coding devices, namely, electronic coding units; encoded identity cards; encoded magnetic identity wristbands; encoded credit cards; encoded pre-paid phone calling cards; computers and computer hardware; data carriers with recorded authentication, IT security, mobile security, financial transaction security, access control and identity verification software; computer hardware for telecommunication; computer network and data communication devices and equipment, namely, communication computers, modems and interfaces; computer software for access to and the use of the Internet; computer software for network administration; recorded computer software for authentication, IT security, financial transaction security, access control and identity verification; downloadable computer software for authentication, IT security, mobile security, financial transaction security, access control and identity verification; computer interface cards; computer interface software; computer software for data base administration; computer software for access to information directories which can be downloaded from the worldwide computer network: computer software for data processing; computer software for communication processing; computer software for financial transactions; computer software for monetary affairs; computer software for data search; computer software for authorization of access to data bases; computer software for controlling and administration of access server applications; computer software for encryption; computer software for the safe transmission of digital information, in particular of confidential financial and credit card data over the Internet as well as other communication lines between computer devices; computer software for use in computer access control; computer software for automation of a process for identity authentication with existing data bases in connection with issuance and administration of digital certificates for authentication or encryption of digital communications or authentication of a digital signature in an electronic transaction or communication over the Internet or other computer networks; computer software for editing and processing of electronic payments by and for third parties; computer software for use in the development of other computer software and software applications; computer software for identity security; computer software for authentication and identity management in connection with information security; computer software for digital information and data access; computer software for detecting unauthorized accesses; computer software for protecting of information and preventing data loss; computer terminals and computer software for use in the financial service business, banking and telecommunication business for authentication, authorization, compensation and processing of financial transactions; data acquisition apparatus, namely, electronic data recorders; data encoding devices; data communication devices, namely, wireless data communication devices for voice, data, or image transmission; data communication software; data protection software; decoding devices; wireless computer accessory devices being computer peripherals; wireless communication devices for voice, data or image transmission; DVDs featuring computer software, data files and instruction manuals in the field of authentication, IT security, mobile security, financial transaction security, access control and identity verification; input scanners; electric devices for admission control; electric control devices for warranty of admission safety; electronic encryption devices; electronic payment terminals; fingerprint scanners; flash memory cards featuring computer software, data files and instructions manuals in the field of authentication, IT security, financial transaction security, mobile security, access control and identity verification; computer software downloadable from a worldwide computer information network for authentication, IT security, mobile security, financial transaction security, access control and identity verification; downloadable electronic publications in the nature of magazines, books and periodicals in the field of authentication, IT security, mobile security, financial transaction security, access control and identity verification; magnetically encoded identity labels; machine readable magnetically encoded identity labels; magnetic encoded identity cards; magnetic identity tapes; magnetic encoded identity tapes; interactive computer software for authentication, IT security, financial transaction security, access control and identity verification; interactive computer systems for use in authentication, IT security, mobile security, financial transaction security, access control and identity verification; interactive data transmission devices, namely, wireless communication devices for voice, data or image transmission; Internet security software; blank smart cards; encoded electronic chip cards, in particular printed bank cards; magnetically encoded money cards; magnetically encoded cash point cards; magnetically encoded cards for electronic capital transfer and for electronic transfer of financial transactions and cards for access to computer software; encoded identity labels; encoded access control cards; encoded key cards; encoded credit cards; credit card readers; readers for encoded magnetic cards; memory cards; network cards; network control apparatus and devices being computer networking hardware; mobile computer platforms consisting of data transmitting/receiving devices, namely, wireless network routers and gateways for acquisition and administration of data; magnetic encoded credit cards and payment cards; blank optical data carriers; optical coding devices; programmable telecommunication apparatus, namely, programmable controls, programmable controllers, programmable timers and programmable digital read-out units; scanners, being data processing devices; encoded key cards; interface cards for computers; interface software, namely, security server interface software; transmitters for transmission of electronic signals; electronic security labels for goods; security devices for data protection, namely, tokens; downloadable software for biometric systems for identification and authentication of individuals; downloadable software for computer telephony; downloadable software for card readers; downloadable software for online news transmission; downloadable software for enabling secure credit card transactions; downloadable software for securing e-mails; memory chips; electronic memory card readers; telecommunication devices, namely, devices for transporting and aggregating voice, data, and video communications across multiple network infrastructures and communications protocols; telecommunication instruments for use in mobile communications networks, namely, exchangers; encrypted encoded cards having security functions for identification purposes; electronic encryption apparatus; admission and access control devices