Y
Mark Identification

Y

Serial Number

88602150

Filing Date

Sep 3, 2019

Registration Date

Feb 9, 2021

Trademark by

YUBICO AB

Active Trademark

Classification Information

Apparatus for recording, transmission or reproducing sound and images; Blank magnetic data carriers; Blank digital storage media; Data processing equipment, namely, computers; Downloadable computer software for computer and smartphone system identity and access management, authentication, sign-on control, and intrusion prevention; Coded electronic chip cards containing programming used to generate the user's unique identity and a single or static passcode; Coded integrated circuit boards containing programming used to generate the user's unique identity and a single or static passcode; Encoded smart cards containing programming used to generate the user's unique identity and a single or static passcode; Coded smart cards that contain programming used to generate the user's unique identity and a single or static passcode; Downloadable communication software for identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable payment software for identity and access management, authentication, sign-on control, and intrusion prevention; Apparatus for electronic payment processing, namely, point-of-sale terminals for making contactless payments, multi-functional electronic payment terminals; Downloadable software for processing electronic payments to and from others; Computer hardware for processing electronic payments to and from others; Downloadable software for processing, transmission, sending, collecting, forwarding and receiving data, information, video, messages, text, calls, audio, graphics and images; Downloadable computer software for identity and access management, authentication, sign-on control, and intrusion prevention for use in the fields of financial services, services related to monetary affairs, money transfer services, electronic payment and fund transfer services, payment services, mobile payment services, electronic wallet services and for the issuance of tokens of value; Downloadable software for user identity management, authenticating user identification, user accounts login, and digital signing of documents; Downloadable computer software for encrypting, decrypting and authenticating data, information and messages; Downloadable computer software to verify data integrity; USB hardware; Computer hardware; Downloadable security software for computer and smartphone system identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable authentication software for identity and access management, sign-on control, and intrusion prevention; Downloadable interactive software for computer and smartphone system identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable smartphone software for identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable cryptography software for identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable application software for computer and smartphone system identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable computer software platforms for computer and smartphone system identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable computer software development tools; Downloadable computer software, namely, threat detection software; Downloadable risk detection software, namely, software for computer and smartphone security and prevention of computer and smartphone risks; Downloadable computer software, namely, voice recognition software; Downloadable computer software, namely, facial recognition software; Downloadable computer software, namely, image recognition software; Downloadable computer software, namely, machine learning software; Downloadable privacy protection software, namely, encryption and filtering software for the control and limitation of collection and dissemination of user data and to protect the user from identity theft; Downloadable computer software, namely, file synchronization software; Downloadable computer software, namely, character recognition software; Downloadable e-commerce software to allow users to perform electronic business transactions via a global computer network; Downloadable information retrieval software, namely, software for searching and retrieving information on the Internet; Downloadable computer software for use in measuring or assessing the reliability of computer hardware; Downloadable computer software for use in the encryption of electronic files; Downloadable computer firmware for computer system identity and access management, authentication, sign-on control, and intrusion prevention; Firmware memory devices, namely, blank flash memory cards; Firmware for computer peripherals, namely, pre-recorded flash memory cards featuring operating system programs; Downloadable computer firmware and device driver software for computer system identity and access management, authentication, sign-on control, and intrusion prevention; Downloadable computer software to maintain, support, and operate computer systems and firmware; Data encryption apparatus, namely, encoded key cards, USB computer security keys, chip cards, chip card readers, encoded smart cards; Downloadable computer software for use in data encryption; Electronic data encryption apparatus, namely, encoded key cards, USB computer security keys, chip cards, chip card readers, encoded smart cards; Electronic encryption units; Encoded identity cards; Access control devices, namely, electronic controllers in the nature of downloadable computer software for use in computer access control; Electronic readers and controllers for controlling access to premises; Electric access security apparatus, namely, electronic key cards and fobs for controlling access to premises; Electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; Downloadable computer software for managing computer network and device security; Cards encoded with security features for identification purposes; Downloadable computer software for use in supply chain management; Downloadable computer software for managing computer hardware utility, security and cryptography; Computer hardware modules for use in electronic devices using the Internet of Things; Encoded electronic chip cards, namely, smart cards, containing programming used to provide identity and access management, authentication, and sign-on control; blank smart cards; Encoded integrated circuit cards containing programming used to provide identity and access management, authentication, and sign-on control; Electronic chips for the manufacture of integrated circuits; Computer chips

Electrical and Scientific Apparatus

Payment processing services, namely, credit card and debit card transaction processing services; Providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments via mobile applications; Processing of electronic wallet payments; Providing electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments; Administration of electronic processing of electronic funds transfer, ACH, credit card, debit card, electronic check and electronic payments; Electronic funds transfer; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial information, data analysis, advice, and consultancy services

Insurance and Financial

Telecommunications services, namely, digital network telecommunication services, personal communication services, telecommunication access and gateway services; communication services, namely, telephone communication services, consulting services in the field of communications, transmission of voice, audio, visual images and data by telecommunications networks, wireless communication networks, the Internet, information services networks and data networks; message services, namely, message sending and receiving services; data communication services, namely, consulting services in the field of data communications and electronic transmission of data and documents among users of computers; providing access to databases; providing access to a global computer network for the transfer and dissemination of information; electronic transmission of messages, data and documents; transmission of database information via telecommunications networks; transmission of sound, video and information; transmission of data by audio-visual apparatus

Telecommunications

Scientific and technological services, namely, research, design, analysis, and testing in the fields of cryptography, computer and smartphone security, and digital certificates and digital signatures authentication; Industrial analysis and research services in the fields of cryptography, computer and smartphone security, and digital certificates and digital signatures authentication; Design and development of computer hardware and software; Development of software for communication systems; Instant messaging software design and development; Computer hardware development; Testing of computer hardware; Design services related to computer hardware and computer programs; Technological research in the field of computer hardware systems; Consultancy in the design and development of computer hardware; Software development; Software design; Installation of computer software; Software customization services; consulting services in the field of computer software; Software engineering services; Maintenance of computer software; Updating of computer software; installation of computer firmware; Configuration of computer firmware; Design and development of computer firmware; Design and development of computer firmware systems; Consultancy and advice in the field of configuration management for computer hardware and software; Scientific research consulting in the fields of cryptography, computer and smartphone security, and digital certificates and digital signatures authentication; Technological consultancy in the fields of cryptography, computer and smartphone security, and digital certificates and digital signatures authentication; Computer programming consultancy; Information technology (IT) consultancy, advisory and information services; Consultancy in the field of computer security; Cloud computing services, namely, providing cloud hosting services; Technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing IT and application systems; Rental of computer software; Installation and customization of computer programs; Data encryption services; Data encryption and decoding services; Encryption, decryption and authentication of electronic information, messages and data; Testing, authentication and quality control for others in the field of computer and smartphone hardware and software systems; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Computer programming services for electronic data security; Computer security threat analysis for protecting data; Monitoring of computer systems for detecting unauthorized access or data breach; Design and development of electronic data security systems; Maintenance of computer software relating to computer security and prevention of computer risks; Updating of computer software relating to computer security and prevention of computer risks; Design and development of computer software for supply chain management; Design and development of computer software for logistics, supply chain management and e-business portals; Information technology (IT) services, namely, IT integration and consulting services; Design of software for embedded devices; Updating of software for embedded devices

Computer and Scientific

Verification of personal identity as part of personal background investigations; opening of security locks; guard services; personal and physical security consultancy; remote monitoring of burglar and security alarms for corporate organizations and private housing, and consultations related thereto; consultation services in the field of the safety needs of commercial and industrial companies; Rental of protective clothing and protective equipment for safety purposes

Personal