ATHENE
Mark Identification

ATHENE

Serial Number

79281199

Filing Date

Sep 26, 2019

Registration Date

Sep 27, 2022

Trademark by

FRAUNHOFER-GESELLSCHAFT ZUR FÖRDERUNG DER ANGEWANDTEN FORSCHUNG E.V.

Active Trademark

Classification Information

Downloadable and recorded antispyware software; Downloadable and recorded computer antivirus software; Recorded data, namely, electronic data files featuring data in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Downloadable and recorded authentication software, namely, for authenticating user identification in the field of cybersecurity for monitoring and ensuring the security of business networks; Downloadable and recorded banking software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Downloadable and recorded biometric software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer; Business intelligence software, namely, downloadable and recorded computer software that provides real-time, integrated business management intelligence by combining information from various databases and presenting it in an easy-to-understand user interface; Computers; Computer peripheral devices; Downloadable and recorded computer software for computer aided software engineering; Downloadable and recorded computer software for the detection of threats to computer networks; Downloadable and recorded computer software for the creation of firewalls; Downloadable and recorded computer software for encryption; Downloadable and recorded dashboard software in the field of cybersecurity, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches; Downloadable and recorded databases in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Downloadable and recorded data management software; Downloadable and recorded privacy software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Downloadable and recorded debugging software; Downloadable and recorded utility, security and cryptography software in the field of cybersecurity privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Digital telephone systems comprised of digital phones and telephone terminals and downloadable and recorded software in the field of cybersecurity, namely, for monitoring and ensuring the security of business networks; Downloadable and recorded embedded software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Electronic security systems for home network comprised of USB computer security keys and security token hardware for cybersecurity for monitoring and ensuring the security of networks and the detection and protection against IT security breaches; Electronic encryption units; Computer firewall software, namely, downloadable and recorded computer software for the creation of firewalls; Downloadable and recorded computer security software in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for surveillance, namely, downloadable and recorded computer software using artificial intelligence cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for driverless cars, namely, downloadable and recorded computer software using artificial intelligence for operating and monitoring driverless cars; Artificial intelligence software for vehicles, namely, downloadable and recorded computer software using artificial intelligence for operating and monitoring vehicles; Artificial intelligence and machine learning software, namely, downloadable and recorded computer software using artificial intelligence in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Artificial intelligence software for analysis, in particular cybersecurity, namely, downloadable and recorded computer software using artificial intelligence in the field of cybersecurity, privacy protection and user data protection, namely, for monitoring and ensuring the security of business networks, for detecting and protecting against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protecting mobile devices and computer networks; Mail server software, namely, downloadable and recorded computer software for controlling and managing access server applications; Downloadable and recorded middleware for management of software functions on electronic devices; Data protection backup units, namely, recorded software and backup drives for computers for storage of data; Downloadable and recorded operational risk management software; Downloadable and recorded computer software for biometric systems for the identification and authentication of persons; Electronic commerce and electronic payment software, namely, downloadable and recorded computer e-commerce software to allow users to perform electronic business transactions via a global computer network; Downloadable and recorded software for granting Internet access; Downloadable and recorded software for the development of secure software, hardware, devices, systems and networks; Industrial automation software, namely, downloadable software for monitoring and controlling communication between computers and automated machine systems; Downloadable and recorded cloud network monitoring software; Downloadable and recorded software for mobile device management; Downloadable and recorded software for mobile device management, in particular in relation to cybersecurity; Downloadable and recorded intrusion detection system software; Downloadable and recorded software for diagnostics and troubleshooting; Downloadable and recorded content control software; Downloadable and recorded software for operating card readers; Downloadable and recorded computer software using artificial intelligence for machine learning software for surveillance; Downloadable and recorded computer software using artificial intelligence for machine learning software for analysis; Downloadable and recorded software for online messaging; Downloadable and recorded software for security testing of hardware, software, devices, systems and networks; Downloadable and recorded software for operating traffic management systems; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for controlling access to systems, devices and data; Downloadable and recorded software, computer hardware and data processing equipment for the administration of software, hardware, devices, systems and networks, in particular with respect to cybersecurity properties; Downloadable and recorded software, computer hardware and data processing equipment for the detection and extraction of embedded marks in data, in particular recognition and extraction of watermarks in multimedia data; Downloadable and recorded software, computer hardware and data processing equipment for the detection and visualization of security-related information and events in software, hardware, devices, systems and networks; Downloadable and recorded software, computer hardware and data processing equipment for marking data, in particular watermarks in multimedia data; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for security analysis of software, hardware, devices, systems and networks; Downloadable and recorded software and devices in the nature of information broker systems comprised of computer terminals, web-based and local data libraries in the nature of downloadable electronic files featuring data libraries, repositories in the nature of downloadable electronic files featuring data forms, web-based and local backup solutions comprised of backup drives for computers and downloadable for software for backing-up data, systems comprised of downloadable and recorded software for network security monitoring (SIEM), web based and local information reporting systems comprised of recorded and downloadable software for information reporting, voice over IP-systems comprised of VOIP phones and Voice over internet protocol (VOIP) phone adapter, firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, managed firewall systems comprised of computer hardware in the nature of firewalls and downloadable computer software for the creation of firewalls, installation and maintenance systems comprised of recorded and downloadable software for enabling the installation and maintenance of software, enterprise collaboration systems (ECS) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, enterprise resource planning systems (ERP) comprised of downloadable and recorded enterprise software in the nature of a database for non-transactional data and a search engine for database content, global information systems (GIS) comprised of downloadable and recorded software for managing information, managed information systems (MIS) comprised of downloadable and recorded software for managing information, detection support systems (DDS) comprised of downloadable and recorded software for security analysis of software, hardware, devices, systems and networks by means of mass analysis; Downloadable and recorded software, computer hardware and data processing equipment for searching, detecting and extracting data traces and data from security-related events in software, hardware, devices, systems and networks; Downloadable and recorded software, computer hardware and data processing equipment for the protection of software, hardware, devices, systems, networks and data, in particular for the protection of confidentiality and against tampering; Downloadable and recorded privacy protection software, namely, for restricting unauthorized access to computer networks; Downloadable and recorded hardware testing software; Downloadable and recorded electronic payment processing software; Downloadable and recorded threat detection software; Downloadable and recorded software for facilitating secure credit card transactions; Downloadable and recorded computer software to maintain and operate computer systems; Downloadable and recorded risk detection software; Downloadable and recorded software for ensuring the security of electronic mails; Downloadable and recorded instant messaging software; Downloadable and recorded software for software analysis; Downloadable and recorded electronic mail management and messaging software; Software programmable microprocessors, namely, electronic encryption units

Electrical and Scientific Apparatus

Market analysis and research; Business consultancy and advisory services, in particular conducting trend analysis to support decisions

Advertising and Business

Telecommunication gateway services; Telecommunication services provided via Internet platforms and portals, namely, providing Internet access, electronic data transmission, Electronic message sending; Providing Internet access to platforms and portals on the Internet; Transmission of encrypted communications, namely, electronic message transmission; Electronic transmission of encrypted messages and images; Providing access to information on the Internet, namely, providing access to databases; Providing user access to computer programs in data networks; Providing access to databases; Computer communication and Internet access, namely, communications by computer terminals, providing Internet access; Telecommunications services between computer networks, namely, peer-to-peer network computer services, namely, electronic transmission of audio, video and other data and documents among computers, providing user access to global computer networks, providing user access to computer programs in data networks; Telecommunications services, namely, services that support the secure electronic transmission of messages; Secure e-mail services, namely, providing electronic transmission of secure e-mail; Secure electronic transmission of data, sound or images; Providing users with secure remote Internet access to private computer networks via the internet; Provision of wireless application protocol (WAP) services including those utilizing a secure communication channel, namely, providing private and secure real time electronic communication over a computer network; Providing virtual private network (VPN) services

Telecommunications

Computer security threat analysis for protecting data; Authentication services for computer security in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection, namely, User authentication services using technology for e-commerce transactions, User authentication services using single sign-on technology for online software applications, Providing user authentication services using blockchain-based software technology for cryptocurrency transactions; Provision of security services for computer networks, computer access and computerized transactions, namely, computer security threat analysis for protecting data; Computer firewall services, namely, computer virus protection services; Computer security services in the nature of administration of digital certificates; Design of software for embedded devices; Services for the secure operation of networks and services using information and communication technology, namely, computer security threat analysis for protecting data in the field of cybersecurity for monitoring and ensuring the security of business networks, for the detection and protection against IT security breaches, for risk analysis for use in creating and implementing business decisions and for protection for mobile devices and computer networks and in the field of privacy protection and user data protection; Data security services, namely, Data security consultancy, Design and development of electronic data security systems, Data encryption services for providing security and anonymity for electronically transmitted credit card transactions; Anti-spamming services, namely, online computer services, namely, providing spam filtering services to protect websites and online applications from receiving unsolicited messages; Computer virus protection services; Computer systems analysis services for analyzing cybersecurity characteristics of equipment, networks, software, hardware, data and services; Computer security services for protection against illegal network access, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Services for the development of devices, networks, software, hardware and services in the field of information and communication technology with enhanced cybersecurity capabilities, namely, cybersecurity services in the nature of restricting unauthorized access to computer systems, Computer security threat analysis for protecting data, Computer security consultancy in the field of scanning and penetration testing of computers, devices, hardware, software and networks to assess information security vulnerability; Technical measuring, namely, measurement evaluations in the field of computer science, communications technology, computer hardware, computer software and software engineering; Electronic data storage and data back-up services; Electronic monitoring of personally identifying information to detect identity theft via the internet; Development and testing of computing methods and algorithms; Testing of software; Development of operating system software; Development of computer firmware; Development of measuring and testing methods, namely, research and development of measurement methods in the field of computer science, communications technology, computer hardware, computer software and software engineering; Development of software for communication systems; Development of software solutions for internet providers and internet users; Development of technologies for the protection of electronic networks; Development of driver software; Preparation of scientific reports, namely, scientific research; Surveying; Technical research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Research relating to computer programs; Research in the field of telecommunications technology; Research in the field of computer hardware; Research in the field of information technology; Research related to networks, in particular security of networks; Research relating to security; Computer software research; Computer software research, in particular security of software; Research related to systems, in particular system security; Research and development services in the field of computer science, communications technology, computer hardware, computer software and software engineering; Rental of software; Industrial analysis and research services related to cybersecurity; Industrial research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Engineering research; Information technology consultancy services relating to the development and use of information and communication technologies and services, in particular with regard to cybersecurity; Information technology services, namely, Outsource service providers in the field of information technology, Planning, design and management of information technology systems; Information technology security, protection and recovery, namely, Planning, design and management of information technology systems, Computer virus protection services, Recovery of computer data; Computer analysis and computer diagnostic services; Configuration of computer networks by software; Configuring computer hardware using software, namely, computer network configuration services; Testing, authentication and quality control; Consumer product security testing and consultancy; Product security testing; Software engineering; Software engineering, in particular for secure software; Technical advice relating to security, namely, computer security software consulting; Technical development and research of new products for others; Technical research; Technical measurement services, namely, measurement evaluations in the field of computer science, communications technology, computer hardware, computer software and software engineering; Technological analysis services in the nature of technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of computer science, communications technology, computer hardware, computer software and software engineering; Technological research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Technological research relating to computers; Technological security testing services, namely, testing, analysis and evaluation of the goods and services of others to determine conformity with certification standards; Monitoring of computer systems by remote access to ensure proper functioning for security purposes; Monitoring of computer systems for detecting unauthorized access or data breach; Rental of Internet security software programs; Rental of software for Internet access; Data encryption services of digital images; Data encryption services of digital music; Data encryption services, decryption and authentication of information, messages and data, namely, electronic document and e-mail authentication services; Scientific research; Scientific research and analysis thereof; Scientific and industrial research in the field of computer science, communications technology, computer hardware, computer software and software engineering; Advisory services relating to science research; Science and technology services, namely, scientific research, analysis, testing and research relating to cybersecurity, privacy and data protection; Science and technology services, namely, scientific research, analysis, testing in the field of computer science, communications technology, computer hardware, computer software and software engineering and research and design related thereto

Computer and Scientific

Providing reconnaissance and surveillance services; Information services related to health and safety, namely, providing information concerning consumer product safety and in the field of public safety; Closed-circuit surveillance services; Personal security consultancy; Consultancy in the field of data theft and identity theft, namely, assignment of owners' contact information or membership number to affix to valuables to facilitate their recovery following loss or theft; Consulting services in the field of national security, namely, physical security consultancy; Safety, rescue, security and enforcement services, namely, security threat analysis for protecting public safety; Security guard services for the protection of property and individuals; Electronic monitoring services for security purposes, namely, monitoring home security alarms; Security assessment of risks, namely, security threat analysis for protecting personal safety; Information services relating to safety, namely, providing information concerning consumer product safety and in the field of public safety; Locksmithing, namely, opening of locks; Safety evaluation, namely, security threat analysis for protecting personal safety; Security guarding for facilities; Security services for the protection of property, namely, security threat analysis for protecting personal property; Security services for the protection of individuals, namely, security threat analysis for protecting personal safety; Security services for the protection of property and individuals, namely, conducting recovery operations for the recovery of property and personnel; Security inspection services for others, namely, inspection of factories for safety purposes; Monitoring of home security systems; Surveillance services

Personal