CRYPTOBOX
Mark Identification

CRYPTOBOX

Serial Number

87727883

Filing Date

Dec 20, 2017

Registration Date

Dec 24, 2019

Trademark by

ERCOM ENGINEERING RESEAUX COMMUNICATIONS

Active Trademark

Classification Information

Apparatus for recording, transmission and reproduction of computer data, sound and images; Apparatus for the collection, storage, encryption, measuring, processing, verification, conversion, switching, transfer, reproduction and transmission of data, namely, gateway routers; electronic databases and computer databases in the field of communication and file encryption, file sharing and storage, recorded on computer media; downloadable electronic databases and computer databases in the field of communication and file encryption, file sharing and storage; Devices for exchanging and storing data, namely, computers, smartphones, cloud storage servers; Data processors; Data processing and computer apparatus; Computer hardware; Smart cards with embedded secure element and key management solution; Computer and smartphone software for communication and file encryption, file sharing and storage; Apparatus for measuring telematics and telephony traffic, for measuring the quality, the transmission and security thereof; Computers and software for use in telecommunications analysis; Computer and smartphone programs for controlling access to one or several computer networks, in particular for securing access to local networks; Computer and smartphone programs for the protection of communications on telephony, radiotelephony and computer networks, in particular by sealing and encrypting data packets using a chip card; Encoded electronic chip cards for the protection of communications on telephony, radiotelephony and computer networks, in particular by sealing and encrypting data packets; Software for computer security, computer programming, software for image analysis and for digital processing of images; computer and smartphone software for database management in the field of cryptographic network security and data security; computer and smartphone software used for automating an identity authentication process using existing databases in connection with the issue and management of digital certificates used for authentication or encryption of digital communications, or the authentication of a digital signature in an electronic transaction or communication over the internet and other computer networks; Encryption software enabling the secure transmission of digital information; Computer and smartphone software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration with existing communications networks; Computer and smartphone software for use in analyzing and reporting IT infrastructure access log data; Software for detecting, blocking, and intercepting malware and other threats to computer software and hardware; Software for detecting, preventing and diagnosing computer security breaches; computer software for collecting, compressing, verifying, converting, processing, transferring, backing up in the nature of safeguarding, storing, restoring and recovering data; Software for encrypting and decrypting digital files, including audio, video, text, binary, still image, graphics and multimedia files; computer and smartphone software for identity security; computer and smartphone software for authentication and identity management information security; computer and smartphone software for data access and digital information management; Software and firmware for the management, transmission and storage of data and information; computer and smartphone software for use in monitoring computers and smartphone for use in response to network and device vulnerability; Computer and smartphone software for communication and file encryption, file sharing and storage; computer and smartphone software for use in response to network and device vulnerability

Electrical and Scientific Apparatus

Telecommunications, namely, secure personal and professional communications; Information about telecommunications; Communications by computer terminals, smartphone and mobile telephony, and by fibre optic networks; Radio communications; Communications by telephone and smartphone; Communications by cellular phones; Communications by radio telephone, smartphone and computer; Provision of access to a global computer network; telecommunication services, namely, electronic bulletin board services; Providing telecommunications connections to a global computer and smartphone network; Rental of telecommunication equipment; Teleconferencing services; Electronic messaging; Providing electronic transmission of secure electronic communication by voice, data, and instant messaging (IM) and file encryption and secure file storage and sharing; Electronic transmission of computer files and data; Electronic communications services, namely, communication and file encryption, file storage and sharing; Communication by or between computers and computer terminals; Electronic transmission of instant messages and data; Providing access to databases; Automatic transfer of digital data using telecommunications channels; Transmission of network security software via a global computer network and electronic transmission of communications and data via email enabling encryption and decryption through the management and filtering of mail sent via a global computer network; providing information, advisory, and consultation services in the field of telecommunications

Telecommunications

Engineering consultation, namely, providing assessments in the fields of science and technology, provided by engineers; Engineering appraisals and research in the scientific and technological fields; Data mining; Cloud computing featuring software for use in communication and file encryption, file storage and sharing; Computer project management relating to electronic data processing; Research relating to data processing; Technical advisory services relating to data processing; Data conversion from physical to electronic media and copying of electronic data; Data encryption services, namely, encoding of data; Data security, namely, hosting software for use by others for use in communication and file encryption, file storage, and sharing; Providing information concerning encryption of electronic data for website and e-commerce transaction security; Engineering in the field of telephony; Engineering in the field of computing and telecommunications; Design and development of computer and smartphone software; Research and development of new products for others; Conducting technical project studies in the field of implementation, integration, and feasibility analysis in the area of communication and file encryption, file sharing, and storage; Engineering of all kinds; Computer programming; Computer and smartphone security consultation, namely, auditing and monitoring computer and smartphone networks; Data conversion of electronic information; Conversion of computer programs and documents, not physical conversion; Conversion of data or documents from physical to electronic media; Computer system design; Computer and smartphone software and telecommunications networks design; Development and design and installation and maintenance and updating of computer software in the field of computing and telecommunications and telephony; Online detection and scanning of malware on websites; Data encryption, namely, encoding and decoding of data; Decoding of data; Design of encryption systems; Design of systems for decrypting and controlling access to all transmission of information; Issue and management of digital certificates used for the authentication or encryption of a digital communication; Issue and management of digital certificates used for the authentication of a digital signature in an electronic communication or transaction on the internet and other computer networks; Providing technical customer support in relation to the aforesaid services, namely, software deployment, troubleshooting, administration and usage support; Application service provider services, namely, hosting computer and smartphone software applications; Providing online, non-downloadable software for computer security testing in the fields of internet and computer security; Computer programming for securing communications by telephone, radiotelephone or computer transmitted via telecommunications networks; Sealing and encrypting using chip cards, namely, micro-SD and operator SIM cards; Computer and smartphone programming for securing and controlling access to one or more computer networks, in particular by sealing and encrypting using a smart card; Development, design and implementation in the field of security systems for computers; Development, design and implementation in the field of access and authorisation systems for computers; Development, design and implementation in the field of security, access and authorisation systems for computer hardware and computer networks; Testing, analysis and consultancy in the field of security, access and authorisation systems for computers, computer hardware and computer networks; Development, design, and implementation in the field of security, access and authorisation systems for computers, computer hardware and computer networks; Testing, analysis and consultancy in the field of authentication, encryption and identification systems for computers, computer hardware and computer networks; Software as a service (SaaS), namely, hosting software for use by others for use of communication in the form of voice, SMS, IM, video, and file encryption, file sharing and storage; Hosting of data servers; Technical support services, namely, troubleshooting of computer software problems; Technical support services, namely, resolution of computer and smartphone software problems; Computer and smartphone security consultancy as it relates to data theft and identity theft; file sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; providing information, advisory, and consultation services in the field of data encryption, electronic data storage, and electronic file sharing

Computer and Scientific

Legal services; Security for the protection of property, except for the transport thereof, namely, threat analysis for protecting personal and professional property; Physical consultancy and advice relating to security; computer and smartphone security consultancy as it relates to data theft and identity theft; Identity verification services, namely, verification of personal identity as part of personal background investigations; Licensing in the field of technology, namely, licensing of source code, computer software and other intellectual property; licensing of computer software for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data; provision of legal and personal physical security information, and advisory and consultancy services

Personal