IRONVEST
Mark Identification

IRONVEST

Serial Number

97835923

Filing Date

Mar 13, 2023

Trademark by

IRONVEST INC.

Classification Information

Downloadable software for user identity authentication; Downloadable software for securing user identity; Downloadable software for securing digital assets; Downloadable software for securing online transactions; Downloadable software for securing electronic commerce transactions; Downloadable software for securing applications and processes for opening or creating new accounts; Downloadable software for protecting identities and online identities of users; Downloadable software for securing user data; Downloadable software for transaction verification; Downloadable software for detecting malicious cyber activity; Downloadable software for detecting fraudulent transactions; Downloadable software for blocking a suspicious transaction; Downloadable software for tokenizing user identity data with transaction data; Downloadable software for combining user identity data with transaction data; Downloadable software for verifying user identity data and transaction data; Downloadable software for blocking cyber attacks; Downloadable software for securing transactions performed via electronic devices and computerized devices; Downloadable software for securing transactions performed via mobile applications and web-based applications; Downloadable software for securing transactions performed via a web browser; Downloadable software for online identity protection; Downloadable software for securing financial transactions; Downloadable software for securing legal transactions; Downloadable software for secure file sharing; Downloadable software for secure management of digital wallets; Downloadable software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Downloadable software for preventing biometric fraud; Downloadable software for access protection; Downloadable software for access guarding; Downloadable software for controlled access to online services; Downloadable software for managing authentication factors; Downloadable software for managing passwords, PINs, and user credentials; Downloadable software for factor-less user authentication; Downloadable software for password-less user authentication; Downloadable software for protection against SIM swap attacks; Downloadable software for protection against Business Email Compromise attacks; Downloadable software for protection against email hijack attacks

Electrical and Scientific Apparatus

Software as a service (SAAS) services featuring software for user identity authentication; Software as a service (SAAS) services featuring software for securing user identity; Software as a service (SAAS) services featuring software for securing digital assets; Software as a service (SAAS) services featuring software for securing online transactions; Software as a service (SAAS) services featuring software for securing electronic commerce transactions; Software as a service (SAAS) services featuring software for securing applications and processes for opening or creating new accounts; Software as a service (SAAS) services featuring software for protecting identities and online identities of users; Software as a service (SAAS) services featuring software for securing user data; Software as a service (SAAS) services featuring software for transaction verification; Software as a service (SAAS) services featuring software for detecting malicious cyber activity; Software as a service (SAAS) services featuring software for detecting fraudulent transactions; Software as a service (SAAS) services featuring software for blocking a suspicious transaction; Software as a service (SAAS) services featuring software for tokenizing user identity data with transaction data; Software as a service (SAAS) services featuring software for combining user identity data with transaction data; Software as a service (SAAS) services featuring software for verifying user identity data and transaction data; Software as a service (SAAS) services featuring software for blocking cyber attacks; Software as a service (SAAS) services featuring software for securing transactions performed via electronic devices and computerized devices; Software as a service (SAAS) services featuring software for securing transactions performed via mobile applications and web-based applications; Software as a service (SAAS) services featuring software for securing transactions performed via a web browser; Software as a service (SAAS) services featuring software for online identity protection; Software as a service (SAAS) services featuring software for securing financial transactions; Software as a service (SAAS) services featuring software for securing legal transactions; Software as a service (SAAS) services featuring software for secure file sharing; Software as a service (SAAS) services featuring software for secure management of digital wallets; Software as a service (SAAS) services featuring software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Software as a service (SAAS) services featuring software for preventing biometric fraud; Software as a service (SAAS) services featuring software for access protection; Software as a service (SAAS) services featuring software for access guarding; Software as a service (SAAS) services featuring software for controlled access to online services; Software as a service (SAAS) services featuring software for managing authentication factors; Software as a service (SAAS) services featuring software for managing passwords, PINs, and user credentials; Software as a service (SAAS) services featuring software for factor-less user authentication; Software as a service (SAAS) services featuring software for password-less user authentication; Software as a service (SAAS) services featuring software for protection against SIM swap attacks; Software as a service (SAAS) services featuring software for protection against Business Email Compromise attacks; Software as a service (SAAS) services featuring software for protection against email hijack attacks; Platform as a service (PAAS) services featuring software for user identity authentication; Platform as a service (PAAS) services featuring software for securing user identity; Platform as a service (PAAS) services featuring software for securing digital assets; Platform as a service (PAAS) services featuring software for securing online transactions; Platform as a service (PAAS) services featuring software for securing electronic commerce transactions; Platform as a service (PAAS) services featuring software for securing applications and processes for opening or creating new accounts; Platform as a service (PAAS) services featuring software for protecting identities and online identities of users; Platform as a service (PAAS) services featuring software for securing user data; Platform as a service (PAAS) services featuring software for transaction verification; Platform as a service (PAAS) services featuring software for detecting malicious cyber activity; Platform as a service (PAAS) services featuring software for detecting fraudulent transactions; Platform as a service (PAAS) services featuring software for blocking a suspicious transaction; Platform as a service (PAAS) services featuring software for tokenizing user identity data with transaction data; Platform as a service (PAAS) services featuring software for combining user identity data with transaction data; Platform as a service (PAAS) services featuring software for verifying user identity data and transaction data; Platform as a service (PAAS) services featuring software for blocking cyber attacks; Platform as a service (PAAS) services featuring software for securing transactions performed via electronic devices and computerized devices; Platform as a service (PAAS) services featuring software for securing transactions performed via mobile applications and web-based applications; Platform as a service (PAAS) services featuring software for securing transactions performed via a web browser; Platform as a service (PAAS) services featuring software for online identity protection; Platform as a service (PAAS) services featuring software for securing financial transactions; Platform as a service (PAAS) services featuring software for securing legal transactions; Platform as a service (PAAS) services featuring software for secure file sharing; Platform as a service (PAAS) services featuring software for secure management of digital wallets; Platform as a service (PAAS) services featuring software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Platform as a service (PAAS) services featuring software for preventing biometric fraud; Platform as a service (PAAS) services featuring software for access protection; Platform as a service (PAAS) services featuring software for access guarding; Platform as a service (PAAS) services featuring software for controlled access to online services; Platform as a service (PAAS) services featuring software for managing authentication factors; Platform as a service (PAAS) services featuring software for managing passwords, PINs, and user credentials; Platform as a service (PAAS) services featuring software for factor-less user authentication; Platform as a service (PAAS) services featuring software for password-less user authentication; Platform as a service (PAAS) services featuring software for protection against SIM swap attacks; Platform as a service (PAAS) services featuring software for protection against Business Email Compromise attacks; Platform as a service (PAAS) services featuring software for protection against email hijack attacks; Providing temporary use of non-downloadable computer software for user identity authentication; Providing temporary use of non-downloadable computer software for securing user identity; Providing temporary use of non-downloadable computer software for securing digital assets; Providing temporary use of non-downloadable computer software for securing online transactions; Providing temporary use of non-downloadable computer software for securing electronic commerce transactions; Providing temporary use of non-downloadable computer software for securing applications and processes for opening or creating new accounts; Providing temporary use of non-downloadable computer software for protecting identities and online identities of users; Providing temporary use of non-downloadable computer software for securing user data; Providing temporary use of non-downloadable computer software for transaction verification; Providing temporary use of non-downloadable computer software for detecting malicious cyber activity; Providing temporary use of non-downloadable computer software for detecting fraudulent transactions; Providing temporary use of non-downloadable computer software for blocking a suspicious transaction; Providing temporary use of non-downloadable computer software for tokenizing user identity data with transaction data; Providing temporary use of non-downloadable computer software for combining user identity data with transaction data; Providing temporary use of non-downloadable computer software for verifying user identity data and transaction data; Providing temporary use of non-downloadable computer software for blocking cyber attacks; Providing temporary use of non-downloadable computer software for securing transactions performed via electronic devices and computerized devices; Providing temporary use of non-downloadable computer software for securing transactions performed via mobile applications and web-based applications; Providing temporary use of non-downloadable computer software for securing transactions performed via a web browser; Providing temporary use of non-downloadable computer software for online identity protection; Providing temporary use of non-downloadable computer software for securing financial transactions; Providing temporary use of non-downloadable computer software for securing legal transactions; Providing temporary use of non-downloadable computer software for secure file sharing; Providing temporary use of non-downloadable computer software for secure management of digital wallets; Providing temporary use of non-downloadable computer software for creating, minting, transferring, trading, exchanging, selling, buying, utilizing, and/or transacting with digital assets, such as crypto-currencies, crypto-coins, Non-Fungible Tokens (NFTs), metaverse avatars, Virtual Reality (VR) assets, Augmented Reality (AR) assets, metaverse assets; Providing temporary use of non-downloadable computer software for preventing biometric fraud; Providing temporary use of non-downloadable computer software for access protection; Providing temporary use of non-downloadable computer software for access guarding; Providing temporary use of non-downloadable computer software for controlled access to online services; Providing temporary use of non-downloadable computer software for managing authentication factors; Providing temporary use of non-downloadable computer software for managing passwords, PINs, and user credentials; Providing temporary use of non-downloadable computer software for factor-less user authentication; Providing temporary use of non-downloadable computer software for password-less user authentication; Providing temporary use of non-downloadable computer software for protection against SIM swap attacks; Providing temporary use of non-downloadable computer software for protection against Business Email Compromise attacks; Providing temporary use of non-downloadable computer software for protection against email hijack attacks

Computer and Scientific