Publication Registration: |
Wednesday, July 31, 2013 |
Design Feature:
|
(1) Other natural phenomena not classified in other divisions or categories -- Note: Including aurora borealis (northern lights).
(2) Keys, part of keys
(3) Keys with bows of circular, oval or constricted oval shape
(4) Men stylized
(5) Other men
(6) Circles
(7) Circles or ellipses containing representations of human beings or parts of the human body
(8) Set of lines evoking sound or electromagnetic waves
(9) More than two lines or two bands
(10) Personified geometrical figures or solids, combinations of geometrical figures or solids representing a personage
|
Goods and Services Information
|
Description:
|
(1) - Security software, namely software that enables authentication of a computing device or a user of the device, to allow the user to access online services or to execute online transactions, and software that securely reads and transmits identity or payment credential information presented by a user; Computer hardware, namely hardware security tokens and payment or identity credential readers.
(2) - Computer network security services, namely authenticating the identity credentials or payment credentials, or the device of a remote user who is requesting a service from a service provider; Online login confirmation services, namely enabling a user making a login request to an online service provider to confirm their login request using a second device; Online transaction confirmation services, namely enabling a user executing a transaction with an online service provider to view the transaction details and approve the transaction using a second device.
(3) - Security software, namely software that enables authentication of a computing device or a user of the device, to allow the user to access online services or to execute online transactions, and software that securely reads and transmits identity or payment credential information presented by a user; Computer hardware, namely hardware security tokens and payment or identity credential readers.
(4) - Computer network security services, namely authenticating the identity credentials or payment credentials, or the device of a remote user who is requesting a service from a service provider; Online login confirmation services, namely enabling a user making a login request to an online service provider to confirm their login request using a second device; Online transaction confirmation services, namely enabling a user executing a transaction with an online service provider to view the transaction details and approve the transaction using a second device.
|