79331419
May 20, 2021
Jan 17, 2023
Active Trademark
downloadable and recorded access security and authorization software for authorizing access to databases; downloadable and recorded computer access security and authorization software for authorizing access to databases; downloadable and recorded software for provision of security on networks, the Internet, extranet and computers; downloadable and recorded software for provision of security concerning online transactions; downloadable and recorded software for provision of online identity protection, privacy control and parental control; downloadable and recorded software to prevent and diagnose computer problems; downloadable and recorded software for provision of intrusion detection and prevention; downloadable and recorded software for scanning, detecting, and removing viruses, spam, adware, spyware and other malware; downloadable and recorded antivirus, antispam, and firewall software for computers incorporating filtering software; downloadable and recorded software for use in monitoring and controlling computer and online activity; downloadable and recorded software for protection against fraud; recorded computer software and downloadable software, namely, utility software; open source software packages, namely, downloadable and recorded open source computer software for authorizing access to databases; downloadable and recorded software for certifying registration and data storage in the field of computer security; downloadable and recorded software for automating processes for archiving physical and electronic data; downloadable and recorded software for logging and traceability in the field of transmitting, securing and archiving of physical and electronic data; downloadable and recorded software for securing and cryptography of physical and electronic data; manual and automatic downloadable and recorded indexing software; downloadable and recorded software for displaying multi-format secure files; downloadable and recorded search engine software; Apparatus for recording, transmitting and reproducing text, sound or images; digital, magnetic and optical recording media, namely, blank data carriers and digital storage media; digital, magnetic and optical data media, namely, blank data carriers and digital storage media; apparatus for recording the time, namely, time clocks for timestamping; downloadable and recorded computer programs for authorizing access to databases; apparatus and instruments for recording, storing, processing, analyzing, transmitting, distributing and displaying data, namely, blank digital storage media, digital displays, data processors; security solutions, namely, downloadable and recorded computer software and programs for managing computer access to resources; downloadable and recorded computer programs for accessing computer networks, wireless networks and the Internet; computer terminals; mobile data terminals
Electrical and Scientific ApparatusEducation, namely, providing courses of instruction in the field of computer security; training in the use and operation of computer security hardware and software; entertainment, namely, organizing and arranging exhibitions for entertainment purposes; organization of competitions, namely, online competitions in the field of entertainment and computer security; organization and conducting of colloquiums, conferences for educational or entertainment purposes, and congresses in the field of computer security; organization of exhibitions for cultural or educational purposes
Education and EntertainmentComputer security consultancy; computer technology support in the field of computer security and data security, namely, help desk services; engineering and technical support services for software and security, namely, troubleshooting of computer software problems; computer diagnostic services; computer data recovery; technical support services, namely, troubleshooting in the nature of diagnosing computer software and hardware problems; software installation services; programming for computers; computer network configuration services; Internet security services, namely, security services for restricting unauthorized access to computer networks, computer systems and computerized transactions; technical advice in relation to software installation and maintenance; consulting services in the field of design, selection, implementation and use of computer apparatus and computer systems; design, elaboration, installation, development, updating, servicing and maintenance of software, software packages comprising computer software programs, applications, computer programs, hosted and/or operated services (SaaS), online databases and computer platforms; provision of technology information in the field of network and Internet security; expertise in the nature of computer software consulting and advisory regarding industrializing free software and open source development; online technical support in the field of computers, software and computer systems, namely, providing online security threat analysis for protecting data; computer security services, namely, computer network security services for enforcing, restricting and controlling computer access privileges of users of computer networks and encrypting data for computerized transactions; controlling the computer systems of others for technical purposes, namely, remote management of information technology systems of others; project studies being research in the field of computer security; risk and prevention studies being research in the field of computer security; setting up and managing technical support procedures for events regarding software, databases, computers and computer security, namely, infrastructure management services for establishing and administering computer disaster recovery plans; implementing computer platforms for the deployment of secure remote technology systems and architectures; provision of technology information in the field of computer and online security services, via computer networks, wireless networks and the Internet; controlling access privileges of users of computer systems for security purposes; provision of computer threat management systems, namely, computer security threat analysis for protecting data provided by means of monitoring and tracking vulnerability and security-related problems in software products, on the Internet, and on computer networks; designing computer systems and software architecture; computer programming services; maintenance of database software; monitoring of computer systems for the detection of unauthorized access or data protection breaches; electronic data storage; online data storage; software as a service (SaaS) featuring software for encrypting data and assigning credentials, featuring software for provision of identity and access security on networks, the Internet, extranet and computers, data security, data analytics ; control software design for self-service terminals
Computer and Scientificlicensing of computer software and programs; security services for monitoring of security alarm systems for the protection of identities, terminals, infrastructures, and computer servers for others; identity screening services, namely, providing background investigations
Personal