ZUKEY
Mark Identification

ZUKEY

Serial Number

88191962

Filing Date

Nov 13, 2018

Trademark by

AMASH LLC

Classification Information

Security token hardware; downloadable or recorded security token software; computer authentication token hardware; downloadable or recorded computer authentication token software; USB computer security keys; electronic security token in the nature of a fob-like device used by an authorized user of a computer system to facilitate authentication; wireless transmitters and receivers; transmitters of electronic signals; data processors; downloadable or recorded computer software for authenticating computer users; downloadable or recorded computer software for network and computer security; downloadable or recorded computer software for data encryption and decryption; downloadable or recorded computer software for accessing secure computer systems and services

Electrical and Scientific Apparatus

Electronic data transmission; electronic transmission of user credentials and user authentication data; providing access to computer programs in data networks; providing access to databases; providing private and secure real time electronic communication over a computer network

Telecommunications

Computer user authentication services; authentication, issuance and validation of digital certificates; software as a service (SaaS) for security token management; software as a service (SaaS) for authentication token management; software as a service (SaaS) for authenticating computer users; software as a service (SaaS) for network and computer security; software as a service (SaaS) for data encryption and decryption; software as a service (SaaS) for accessing secure computer systems and services; data security consulting; information technology consulting; data encryption services; computer security services in the nature of administering digital certificates; computer security services in the nature of administering digital keys; computer security services, namely, restricting unauthorized access to computers and computer networks; computer security services, namely, restricting unauthorized network access by users without credentials; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials

Computer and Scientific