42 Computer programming and computer software design; development of computer platforms; software as a service (SAAS) services featuring cloud computing identity and access management software for computer and mobile device user identity authentication and management, password authentication, sign-on control, intrusion prevention and for governing, authenticating, enforcing, restricting, controlling and managing access privileges of users to data, managed workspaces and privileged access management, software applications and cloud, mobile and network resources; software as a service (SAAS) services, namely, hosting software for use by others to securely enroll, verify, issue, authenticate and manage personal and digital identities; design, development, installation, repair, and maintenance of computer software used for identifying and authenticating data, documents, and personal identity; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned verified personal identification credentials; providing online non-downloadable cloud computing software application platforms for detecting and restricting unauthorized access or data breach of computer systems; providing online non-downloadable computer software for encryption, decryption, authentication and verification of data, information and messages; providing online non-downloadable software for accessing, controlling, and operating electronic fingerprint readers and fingerprint imagers; providing online non-downloadable software for identifying persons based on information and data from a biometric verification, identification, and security software system; providing online non-downloadable software for document authentication and identity verification; providing online non-downloadable software and firmware for authenticating user identification using one or more identity biometric characteristics for the purposes of authenticating documents and verifying data